Commit Graph

5 Commits

Author SHA1 Message Date
Gabriel Nagy
7ffab2f1cb
authelia-server.conf: allow pipe character in URI
The characters in the regex used for mitigating CVE-2021-32637 are not
exhaustive since query strings seem to not always conform to the
RFC3986, this is also mentioned in the security advisory for the CVE.[1]

For example, attempting to delete multiple torrents in the qBittorrent
WebUI results in an URL like the following:

    confirmdeletion.html?hashes=HASH1|HASH2

This URL is valid and parsable by Authelia, but due to the regex it gets
redirected infinitely.

To fix this, also allow pipe characters in the request URI.

[1] https://github.com/authelia/authelia/security/advisories/GHSA-68wm-pfjf-wqp6
2022-02-16 10:58:12 +02:00
aptalca
224abb686d update authelia-server.conf for resolver and CVE 2021-05-28 17:40:28 -04:00
James Elliott
e116a1829e
feat(authelia): add remote name/email headers and pass http method
This adds newer remote credential information from the auth_request headers sent by Authelia, Remote-Name includes the users display name, and Remote-Email includes their email. Additionally it sets the X-Forwarded-Method header to the original $request_method detected by nginx, which is used for the new acl rule method filter.
2021-04-21 13:17:25 +10:00
aptalca
cb468cd7ee fix github links 2020-08-03 13:41:52 -04:00
aptalca
9352a59250 initial release 2020-08-03 11:00:14 -04:00