From: Rich Bowen
Date: Mon, 11 May 2026 17:12:49 +0000 (+0000)
Subject: Rewrite guide: merge duplicate SSRF warning in flags.xml [P] section
X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=6f70546fb29572d89062b4004a7165fc3ce48c0a;p=thirdparty%2Fapache%2Fhttpd.git
Rewrite guide: merge duplicate SSRF warning in flags.xml [P] section
The [P] flag section had two nearly identical security warnings.
Merge into a single comprehensive warning that names the SSRF
vulnerability explicitly and includes the mitigation advice from
both.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1934111 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/rewrite/TODO.md b/docs/manual/rewrite/TODO.md
index 338e2dbce3..8cc356cffd 100644
--- a/docs/manual/rewrite/TODO.md
+++ b/docs/manual/rewrite/TODO.md
@@ -5,7 +5,7 @@ result in one file "owning" the content and others cross-referencing it.
## HIGH Priority
-- [ ] **Per-directory path stripping** explained in full across three files
+- [x] **Per-directory path stripping** explained in full across three files
(intro.xml, tech.xml, htaccess.xml) with near-identical comparison
tables in tech.xml and htaccess.xml.
â htaccess.xml owns it; others get a brief mention + xref.
@@ -24,7 +24,7 @@ result in one file "owning" the content and others cross-referencing it.
description and complexity warnings from intro.xml.
â Rewritten as concise intro + structured guide overview.
-- [ ] **Duplicate SSRF warning in flags.xml** â two nearly identical
+- [x] **Duplicate SSRF warning in flags.xml** â two nearly identical
warning boxes within the [P] flag section.
â Remove the literal duplicate.
diff --git a/docs/manual/rewrite/flags.xml b/docs/manual/rewrite/flags.xml
index 96f03a2f5f..f810d98dc0 100644
--- a/docs/manual/rewrite/flags.xml
+++ b/docs/manual/rewrite/flags.xml
@@ -633,10 +633,14 @@ to map remote content into the namespace of the local server.
Security Warning
Take care when constructing the target URL of the rule, considering
-the security impact from allowing the client influence over the set of
-URLs to which your server will act as a proxy. Ensure that the scheme
-and hostname part of the URL is either fixed, or does not allow the
-client undue influence.
+the security impact of allowing the client influence over the set of
+URLs to which your server will act as a proxy. If any part of the
+target URL is derived from user input (backreferences, query strings,
+etc.), an attacker may be able to cause your server to make requests
+to arbitrary internal or external hosts. This is known as a
+Server-Side Request Forgery (SSRF) vulnerability. Ensure that the
+scheme and hostname part of the URL is either fixed, or does not allow
+the client undue influence.
@@ -657,16 +661,6 @@ will be used automatically.
Note: mod_proxy must be enabled in order
to use this flag.
-Security warning
-Take care when constructing the target URL of the rule, considering
-the security impact of allowing the client influence over the set of
-URLs to which your server will act as a proxy. If any part of the
-target URL is derived from user input (backreferences, query strings,
-etc.), an attacker may be able to cause your server to make requests
-to arbitrary internal or external hosts. This is known as a
-Server-Side Request Forgery (SSRF) vulnerability.
-
-