Information
NGINX routes incoming requests to the appropriate virtual host by matching the Host header (HTTP/1.1) or :authority pseudo-header (HTTP/2, HTTP/3) against the server_name directives in your configuration. If no explicit match is found, NGINX falls back to the first defined server block or the one marked as default_server . Without a properly configured catch-all block that rejects unknown hostnames, your server will respond to arbitrary domain names that happen to point to your IP address, potentially exposing internal applications or enabling Host Header attacks.
When NGINX receives a request, it selects the virtual host based on the Host header (or :authority in HTTP/2/3). If requests for unknown host names are not explicitly rejected, your applications may be served for arbitrary domains that simply point to your IP. This behavior can be abused in Host Header attacks and makes it harder to distinguish legitimate traffic from automated scans or misrouted requests in your logs.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Configure a \"Catch-All\" default server block as the first block in your configuration (or explicitly marked with default_server ).
Configuration Example (Modern Standard with TLS/HTTP3):
server {
# Listen on standard ports for IPv4 and IPv6
listen 80 default_server;
listen [::]:80 default_server;
# Listen for HTTPS (TCP) and QUIC (UDP)
listen 443 ssl default_server;
listen [::]:443 ssl default_server;
listen 443 quic default_server;
listen [::]:443 quic default_server;
# Reject SSL Handshake for unknown domains (Prevents cert leakage)
ssl_reject_handshake on;
# Catch-all name
server_name _;
# Close connection without response (Non-standard code 444)
return 444;
}
After adding this block, ensure all your valid applications have their own server blocks with explicit server_name directives.
Impact:
Clients accessing the server directly via IP address or an unconfigured CNAME will be rejected. This is intended behavior but requires that all valid domains are explicitly defined in their own server blocks.