nginx_docker-swag/root/defaults
Gabriel Nagy 7ffab2f1cb
authelia-server.conf: allow pipe character in URI
The characters in the regex used for mitigating CVE-2021-32637 are not
exhaustive since query strings seem to not always conform to the
RFC3986, this is also mentioned in the security advisory for the CVE.[1]

For example, attempting to delete multiple torrents in the qBittorrent
WebUI results in an URL like the following:

    confirmdeletion.html?hashes=HASH1|HASH2

This URL is valid and parsable by Authelia, but due to the regex it gets
redirected infinitely.

To fix this, also allow pipe characters in the request URI.

[1] https://github.com/authelia/authelia/security/advisories/GHSA-68wm-pfjf-wqp6
2022-02-16 10:58:12 +02:00
..
dns-conf Update infomaniak.ini 2021-11-22 08:04:05 +01:00
fail2ban Ignore plex unauthorized requests 2022-01-11 09:19:16 +02:00
502.html Format files 2021-04-27 10:08:22 -05:00
authelia-location.conf feat(authelia): add remote name/email headers and pass http method 2021-04-21 13:17:25 +10:00
authelia-server.conf authelia-server.conf: allow pipe character in URI 2022-02-16 10:58:12 +02:00
default Move maxmind to a new mod 2021-12-04 20:57:16 +02:00
dhparams.pem use lsio wheel index, use ffdhe4096 per rfc7919 2021-05-14 10:43:47 -04:00
index.html Format files 2021-04-27 10:08:22 -05:00
jail.local Added a fail2ban jail for nginx unauthorized 2022-01-09 17:16:11 +02:00
ldap.conf fix github links 2020-08-03 13:41:52 -04:00
nginx.conf Added a fail2ban jail for nginx unauthorized 2022-01-09 17:16:11 +02:00
proxy.conf Mitigate https://httpoxy.org/ vulnerabilities. 2021-10-26 08:33:36 -05:00
ssl.conf Add an optional header to opt out of Google FLoC 2021-09-19 22:37:47 +03:00