October 2013 ngx_pagespeed Security Update.

Overview

All versions of ngx_pagespeed prior to 1.6.29.7 are subject to critical cross-site scripting (XSS) vulnerability CVE-2013-6111. Depending on configuration this may permit a hostile third party to execute JavaScript in users' browsers in the context of the domain running ngx_pagespeed, which could permit theft of users' cookies or data on the site.

Because of the severity of the problem, users of affected versions are stronglyencouraged to immediatelyupdate ngx_pagespeed or apply the workaround below.

To be notified of further security updates subscribe to the announcements mailing list .

Solutions

Users of affected versions should either apply the workaround or update to version 1.6.29.7 or later.

Workaround

The vulnerability requires access to /ngx_pagespeed_statistics , /ngx_pagespeed_global_statistics , or /ngx_pagespeed_message . Prohibiting access to these in your nginx.conf is sufficient to keep it from being exploited. Note that it is not enough to restrict these pages to trusted users; they must not be accessible to anyone. Example workaround configuration:

location /ngx_pagespeed_statistics { deny all; }
location /ngx_pagespeed_global_statistics { deny all; }
location /ngx_pagespeed_message { deny all; }

While ngx_pagespeed and mod_pagespeed are very similar, this workaround is not sufficient for mod_pagespeed. If you also run PageSpeed in Apache please follow the recommendations in the October 2013 mod_pagespeed Security Update .

Update

Users unable to apply the workaround, or who want continued access to the informational data provided by /ngx_pagespeed_statistics or /ngx_pagespeed_message should update to an unaffected version. This requires building nginx with the updated ngx_pagespeed module and installing it in place of the current version. See the build instructions .

Users having difficulty applying these updates or with other questions should write to the discussion group .

Create a Mobile Website
View Site in Mobile | Classic
Share by: