WhisperX tag archive

#curl_init

This page collects WhisperX intelligence signals tagged #curl_init. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (5)

The Lab · 2026-04-08 08:27:07 · GitHub Issues

1. Semgrep 扫描发现关键 SSRF 漏洞:用户输入直通 curl_init,服务器面临内部网络攻击风险

Semgrep 安全扫描工具在一段 PHP 代码中检测到两处严重的服务器端请求伪造(SSRF)漏洞。核心风险在于,用户完全可控的输入数据(`$name` 和 `$code`)未经任何验证,直接传递给了 `curl_init()` 函数。这意味着攻击者可以操纵这些参数,迫使服务器向内部网络服务或任意外部主机发起请求,从而可能探测内网结构、访问受保护的内部系统,或作为攻击跳板。 漏洞位于 `example-codes/index8.php` 文件的第13行和第14行。代码片段显示,`curl_init($name);` 和 `curl_init($code);` 直接使用了来自用户的变量。这种模式是典型的 SSRF 漏洞模式,因为应用...

The Lab · 2026-04-14 12:22:52 · GitHub Issues

2. Semgrep Flags Critical SSRF Vulnerabilities in PHP Code, Exposing Internal Network Access

A Semgrep security scan has flagged critical Server-Side Request Forgery (SSRF) vulnerabilities in PHP code, exposing a direct path for attackers to force the server to make unauthorized requests to internal services or arbitrary external hosts. The automated rule `ssrf-taint` detected that user-controlled input flows ...

The Lab · 2026-04-16 08:22:52 · GitHub Issues

3. Semgrep Flags Critical SSRF Vulnerability in PHP Code: Unvalidated User Input Reaches curl_init

A critical Server-Side Request Forgery (SSRF) vulnerability has been detected in a PHP codebase, allowing an attacker to potentially force the server to make unauthorized network requests. The security finding, identified by the `ssrf-taint` rule, reveals that user-controlled data from the variable `$name` flows direct...

The Lab · 2026-04-17 11:23:00 · GitHub Issues

4. Semgrep Flags Critical SSRF Vulnerability in PHP Code: Unvalidated User Input Reaches curl_init

A critical Server-Side Request Forgery (SSRF) vulnerability has been flagged by the Semgrep static analysis tool, exposing a direct path for attackers to manipulate server-side requests. The core issue is that user-controlled data, specifically the variable `$name`, flows directly into the `curl_init()` function withou...

The Lab · 2026-04-20 13:22:56 · GitHub Issues

5. Semgrep 扫描发现 SSRF 漏洞:用户输入 $name 直接流入 curl_init() 函数

Semgrep 安全扫描工具在一段 PHP 代码中检测到一处严重的服务器端请求伪造(SSRF)漏洞。核心风险在于,用户完全可控的输入变量 `$name` 未经任何验证或净化,便直接传递给了 `curl_init()` 函数。这使得攻击者能够操纵服务器向内部网络服务或任意外部主机发起 HTTP 请求,从而可能访问或攻击本应隔离的后端系统、元数据服务或内部 API。 该漏洞的具体位置位于 `example-codes/index10.php` 文件的第 13 行。代码片段 `curl_init($name);` 清晰地展示了攻击面:应用程序直接使用来自用户的 `$name` 参数来初始化 cURL 会话。由于缺乏对 `$name` 值...