Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade nategood/httpful
to version 1.0.0 or higher.
nategood/httpful is a Readable, chainable, REST-friendly, PHP HTTP client
Affected versions of this package are vulnerable to Insecure Defaults in the form of not enforcing SSL certificate verification in Httpful/Request.php
. The default behavior is to use withoutStrictSSL()
This allows an attacker to send an expired or otherwise invalid certificate, and have it accepted without verifying the originating host.
<?php
require("httpful/bootstrap.php");
$url = "https://self-signed.badssl.com";
// OR
$url = "https://untrusted-root.badssl.com";
$response = \Httpful\Request::get($url)
// Uncomment this to re-enable certificate validation as we would expect it to be by default
// ->withStrictSSL()
->send();
echo "{$response}";
?>