In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade rustls-webpki to version 0.103.12, 0.104.0-alpha.6 or higher.
Affected versions of this package are vulnerable to Improper Certificate Validation due to the incorrect acceptance of permitted subtree name constraints for DNS names in certificates asserting a wildcard name. An attacker can bypass intended name constraints by presenting a certificate with a wildcard DNS name that matches outside the permitted subtree after signature verification and in cases of certificate misissuance.
Note: This is only exploitable if a misissued certificate is accepted after signature verification.