1. 常见扫描Web前端服务器 nginx 出现的一些漏洞 :
- 点击劫持 : X-Frame-Options 未配置
- 目标X-Content-Type-Options响应头缺失
- 目标X-XSS_Protection响应头缺失
- 目标Content-Security-Policy响应头缺失
- 目标Strict-Transport-Security响应头缺失
- 目标Referrer-Policy响应头缺失
- 目标X-Permitted-Cross-Domain-Policies响应头缺失
- 目标X-Download-Options响应头缺失
2. 处理方式 :
在nginx.conf 配置文件中,增加如下配置内容(我习惯在server里面添加):
server {
listen 80;
server_name *.demo.com;
root "/www/demo";
location / {
index index.php index.html error/index.html;
error_page 404 /error/404.html;
include D:/phpstudy_pro/WWW/8100ktc/nginx.htaccess;
autoindex off;
}
location ~ \.php(.*)$ {
fastcgi_pass 127.0.0.1:9007;
fastcgi_index index.php;
fastcgi_split_path_info ^((?U).+\.php)(/?.+)$;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
fastcgi_param PATH_INFO $fastcgi_path_info;
fastcgi_param PATH_TRANSLATED $document_root$fastcgi_path_info;
include fastcgi_params;
}
add_header X-Content-Type-Options nosniff;
add_header 'Referrer-Policy' 'origin';
add_header X-Download-Options "noopen" always;
add_header Strict-Transport-Security "max-age=63072000; includeSubdomains; preload";
add_header X-Permitted-Cross-Domain-Policies "master-only";
add_header X-Frame-Options SAMEORIGIN;
add_header Content-Security-Policy "default-src 'self' data: *.xxx.com 'unsafe-inline' 'unsafe-eval' mediastream: ";
add_header X-Content-Type-Options: nosniff;
add_header X-XSS-Protection "1; mode=block";
# proxy_hide_header X-Powered-By;
}
}
3.拓展(更加详细的信息 , 属性配置) :
Nginx生产环境中的漏洞处理_是维C呀的博客-CSDN博客
Nginx 解决内容安全策略CSP(Content-Security-Policy)配置方式(漏洞修复) - 龙凌云端 - 博客园 (cnblogs.com)
nginx漏扫响应头缺失_检测到目标x-content-type-options响应头缺失_那小子很拽的博客-CSDN博客