In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade rustls-webpki to version 0.103.12, 0.104.0-alpha.6 or higher.
Affected versions of this package are vulnerable to Improper Certificate Validation due to improper enforcement of name constraints for URI names. An attacker can bypass intended certificate restrictions by presenting a certificate with improperly accepted URI name constraints after successful signature verification and in cases of certificate misissuance.
Note: This is only exploitable if a certificate is misissued and signature verification is passed.