Skip to content

Commit

Permalink
Clarify SSRF protection
Browse files Browse the repository at this point in the history
  • Loading branch information
iandunn authored Mar 8, 2017
1 parent 6179ea5 commit 929d667
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion WordPressSecurityWhitePaper.html
Original file line number Diff line number Diff line change
Expand Up @@ -108,7 +108,7 @@ <h3>Further Security Risks and Concerns</h3>
<h4>XXE (XML eXternal Entity) processing attacks</h4>
<p>When processing XML, WordPress disables the loading of custom XML entities to prevent both External Entity and Entity Expansion attacks. Beyond PHP's core functionality, WordPress does not provide additional secure XML processing API for plugin authors.</p>
<h4>SSRF (Server Side Request Forgery) Attacks</h4>
<p>HTTP requests issued by WordPress are filtered to prevent access to loopback and private IP addresses. Additionally, access is only allowed to certain standard HTTP ports.</p>
<p>Outbound HTTP(S) requests issued by WordPress are filtered to prevent access to loopback and private IP addresses. They are also filtered to restrict requests to certain standard HTTP ports (`80`, `443`, and `8080`). This filtering is done by the `wp_http_validate_url()` function, and takes place automatically when the `wp_safe_remote_get()` and `wp_safe_remote_post()` functions are used.</p>
<h2>WordPress Plugin and Theme Security</h2>
<h3>The Default Theme</h3>
<p>WordPress requires a theme to be enabled to render content visible on the frontend. The default theme which ships with core WordPress (currently "Twenty Fifteen") has been vigorously reviewed and tested for security reasons by both the team of theme developers plus the core development team.</p>
Expand Down

0 comments on commit 929d667

Please sign in to comment.