Changeset 58384
- Timestamp:
- 06/11/2024 07:07:35 AM (6 months ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/wp-includes/http.php
r56352 r58384 31 31 * 32 32 * This function is ideal when the HTTP request is being made to an arbitrary 33 * URL. The URL is validated to avoid redirection and request forgery attacks. 33 * URL. The URL, and every URL it redirects to, are validated with wp_http_validate_url() 34 * to avoid Server Side Request Forgery attacks (SSRF). 34 35 * 35 36 * @since 3.6.0 … … 37 38 * @see wp_remote_request() For more information on the response array format. 38 39 * @see WP_Http::request() For default arguments information. 39 * 40 * @see wp_http_validate_url() For more information about how the URL is validated. 41 * 42 * @link https://owasp.org/www-community/attacks/Server_Side_Request_Forgery 43 * 40 44 * @param string $url URL to retrieve. 41 45 * @param array $args Optional. Request arguments. Default empty array. … … 53 57 * 54 58 * This function is ideal when the HTTP request is being made to an arbitrary 55 * URL. The URL is validated to avoid redirection and request forgery attacks. 59 * URL. The URL, and every URL it redirects to, are validated with wp_http_validate_url() 60 * to avoid Server Side Request Forgery attacks (SSRF). 56 61 * 57 62 * @since 3.6.0 … … 59 64 * @see wp_remote_request() For more information on the response array format. 60 65 * @see WP_Http::request() For default arguments information. 66 * @see wp_http_validate_url() For more information about how the URL is validated. 67 * 68 * @link https://owasp.org/www-community/attacks/Server_Side_Request_Forgery 61 69 * 62 70 * @param string $url URL to retrieve. … … 75 83 * 76 84 * This function is ideal when the HTTP request is being made to an arbitrary 77 * URL. The URL is validated to avoid redirection and request forgery attacks. 85 * URL. The URL, and every URL it redirects to, are validated with wp_http_validate_url() 86 * to avoid Server Side Request Forgery attacks (SSRF). 78 87 * 79 88 * @since 3.6.0 … … 81 90 * @see wp_remote_request() For more information on the response array format. 82 91 * @see WP_Http::request() For default arguments information. 92 * @see wp_http_validate_url() For more information about how the URL is validated. 93 * 94 * @link https://owasp.org/www-community/attacks/Server_Side_Request_Forgery 83 95 * 84 96 * @param string $url URL to retrieve. … … 97 109 * 98 110 * This function is ideal when the HTTP request is being made to an arbitrary 99 * URL. The URL is validated to avoid redirection and request forgery attacks. 111 * URL. The URL, and every URL it redirects to, are validated with wp_http_validate_url() 112 * to avoid Server Side Request Forgery attacks (SSRF). 100 113 * 101 114 * @since 3.6.0 … … 103 116 * @see wp_remote_request() For more information on the response array format. 104 117 * @see WP_Http::request() For default arguments information. 118 * @see wp_http_validate_url() For more information about how the URL is validated. 119 * 120 * @link https://owasp.org/www-community/attacks/Server_Side_Request_Forgery 105 121 * 106 122 * @param string $url URL to retrieve. … … 521 537 /** 522 538 * Validate a URL for safe use in the HTTP API. 539 * 540 * Examples of URLs that are considered unsafe: 541 * 542 * - ftp://example.com/caniload.php (Invalid protocol - Only http and https are allowed) 543 * - http:///example.com/caniload.php (Malformed URL) 544 * - http://user:pass@example.com/caniload.php (Login information) 545 * - http://exampleeeee.com/caniload.php (Invalid hostname, as the IP cannot be looked up in DNS) 546 * 547 * Examples of URLS that are considered unsafe by default: 548 * 549 * - http://192.168.0.1/caniload.php (IPs from LAN networks. This can be changed with the Wordpress filter http_request_host_is_external) 550 * - http://198.143.164.252:81/caniload.php (By default, only 80, 443 and 8080 are allowed. This can be changed with the Wordpress filter http_allowed_safe_ports) 523 551 * 524 552 * @since 3.5.2
Note: See TracChangeset
for help on using the changeset viewer.