NShiftKey-Rule-Guide logo NShiftKey-Rule-Guide

1. Vulnerability Description

2. How to check vulnerability

3. Vulnerability Countermeasure

3.1. Process only allowed URLs

3.2. Processing for unacceptable URLs

3.3. Do not use unnecessary parameters

4. Sample Code

...
$ch = curl_init($_get['url']);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_HEADER, 0);
$data = curl_exec($ch);
curl_close($ch); 
...
$url = $_get['url'];
$url = check_url($url);  // check_url function is a function that verifies and returns the input value.  
$ch = curl_init($url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_HEADER, 0);
$data = curl_exec($ch);
curl_close($ch);