BigW Consortium Gitlab

  1. 06 Apr, 2017 1 commit
  2. 21 Mar, 2017 1 commit
  3. 08 Mar, 2017 1 commit
  4. 03 Mar, 2017 2 commits
  5. 01 Mar, 2017 1 commit
  6. 07 Feb, 2017 1 commit
  7. 31 Jan, 2017 13 commits
  8. 27 Jan, 2017 1 commit
  9. 12 Dec, 2016 1 commit
  10. 08 Aug, 2016 1 commit
  11. 12 Jul, 2016 1 commit
    • Defend against 'Host' header injection · 47b5b441
      Jacob Vosmaer authored
      Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/17877 .
      
      This change adds 'defense in depth' against 'Host' HTTP header
      injection. It affects normal users in the following way. Suppose your
      GitLab server has IP address 1.2.3.4 and hostname gitlab.example.com.
      Currently, if you enter 1.2.3.4 in your browser, you get redirected to
      1.2.3.4/users/sign_in. After this change, you get redirected from
      1.2.3.4 to gitlab.example.com/users/sign_in. This is because the
      address you typed in the address bar of your browser ('1.2.3.4'),
      which gets stored in the 'Host' header, is now being overwritten to
      'gitlab.example.com' in NGINX.
      
      In this change we also make NGINX clear the 'X-Forwarded-Host' header
      because Ruby on Rails also uses that header the same wayas the 'Host'
      header.
      
      We think that for most GitLab servers this is the right behavior, and
      if not then administrators can change this behavior themselves at the
      NGINX level.
  12. 03 Jun, 2016 2 commits
  13. 23 May, 2016 1 commit
  14. 22 May, 2016 1 commit
  15. 28 Apr, 2016 1 commit
  16. 22 Apr, 2016 1 commit
  17. 14 Apr, 2016 1 commit
  18. 11 Mar, 2016 1 commit
  19. 09 Feb, 2016 1 commit
  20. 08 Feb, 2016 2 commits
  21. 25 Jan, 2016 1 commit
  22. 21 Jan, 2016 1 commit
  23. 24 Dec, 2015 1 commit
  24. 15 Dec, 2015 1 commit
  25. 11 Dec, 2015 1 commit