mirror of
https://github.com/louislam/uptime-kuma.git
synced 2026-03-02 22:57:00 -05:00
Parse Error: Invalid header value char #23
Labels
No labels
A:accessibility
A:api
A:cert-expiry
A:core
A:dashboard
A:deployment
A:documentation
A:domain expiry
A:incidents
A:maintenance
A:metrics
A:monitor
A:notifications
A:reports
A:settings
A:status-page
A:ui/ux
A:user-management
Stale
ai-slop
blocked
blocked-upstream
bug
cannot-reproduce
dependencies
discussion
duplicate
feature-request
feature-request
good first issue
hacktoberfest
help
help wanted
house keeping
invalid
invalid-format
invalid-format
question
releaseblocker 🚨
security
spam
type:enhance-existing
type:new
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/uptime-kuma#23
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @cirrusflyer on GitHub (Jul 12, 2021).
Removed old Docker image and setup latest 1.0.1. Added a check to a website that was successfully being checked prior. Getting this error:
Parse Error: Invalid header value char
Have another site that's still working fine. So this error is new with this new version.
@louislam commented on GitHub (Jul 12, 2021):
I think it caused by invalid http response header rather than 1.0.1 itself, because 1.0.1 just added User-Agent and nothing else in this part.
Related issue:
https://github.com/nodejs/node/issues/27711
@cirrusflyer commented on GitHub (Jul 12, 2021):
Thanks. I wonder why it was working fine in earlier version.
@cirrusflyer commented on GitHub (Jul 15, 2021):
I see the Incapsula WAF reference here as well, which is what we use. Any way to make the changes others are suggesting to resolve this issue?
@gufastian commented on GitHub (Aug 26, 2021):
Getting the same issue on apparently well configured websites.
@adumont commented on GitHub (Oct 4, 2021):
Same issue here for some webs (also a web protected by Incapsula ... btw)
@louislam commented on GitHub (Oct 4, 2021):
You should report to Incapsula, because they are corrupted your http header.
Uptime Kuma here to tell your that.
@cirrusflyer commented on GitHub (Feb 3, 2022):
Just an update. I spoke with Incapsula (Imperva) and they stated this:
"I suspect that this is being caused by our client classification cookie, which is a malformed cookie by design...The client classification cookie is just one of many different client classification methods that we use, so disabling it will not increase the security risk towards the site."
I also know that Uptime Robot, OhDear!, and others don't have this issue. What's unique about Kuma?
@simmessa commented on GitHub (Mar 18, 2022):
Hi there,
for the people coming here for a fix I just wanted to add that if you're running uptime-kuma in docker container and you see this issue (maybe you're unlucky enough to be forced to monitor resources behing incapsula malformed cookies) you can quickly fix by launching the docker container with --insecure-http-parser like this:
Please make sure the --insecure-http-parser goes before the js file for this to work.
Hope it's useful to you all.
p.s.:
Please do some research on the security implications of using that --insecure-http-parser switch, there's more here: https://nodejs.org/docs/latest-v12.x/api/cli.html#cli_insecure_http_parser
@adumont commented on GitHub (Mar 18, 2022):
Just tested, --insecure-http-parser switch working for me. Thanks (I do have some sites behind Imperva Incapsula)
@henkisdabro commented on GitHub (Apr 15, 2022):
Thanks @simmessa for the solution, much appreciated! Would it be possible to implement some type of "disregard malformed cookies" option on per-monitor level? That way we don't need to make the entire Uptime Kuma instance parse insecure HTTP headers, but rather only when really necessary.
@mitin20 commented on GitHub (Jun 5, 2022):
works perfectly behind imperva-incapsula sites using docker thanks!!! @simmessa @adumont
BTW any idea how to include --insecure-http-parser on kubernetes manifest
@3deep5me commented on GitHub (Jun 9, 2022):
@mitin20 check this spec out on a k8s deployment:
@louislam commented on GitHub (Jun 9, 2022):
Using environment variable should be easier in Docker/K8s.
NODE_OPTIONS=--insecure-http-parser@MrCaringi commented on GitHub (Jul 14, 2022):
Thanks it worked for my docker-compose too:
@bamhm182 commented on GitHub (Oct 19, 2022):
Just chiming in here to say I too would like to see the ability to implement this on a per-monitor level as well.