The POODLE attack (SSLv3 supported) for https://grtp.co/
Low
Vulnerability Details
Websites that support SSLv3 and CBC-mode ciphers are potentially vulnerable to an active MITM (Man-in-the-middle) attack. This attack, called POODLE, is similar to the BEAST attack and also allows a network attacker to extract the plaintext of targeted parts of an SSL connection, usually cookie data. Unlike the BEAST attack, it doesn't require such extensive control of the format of the plaintext and thus is more practical.
The impact of this vulnerability
An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between the affected service and clients.
How to fix this vulnerability
It's recommended to disable SSLv3 and replace it with TLSv1.0 as soon as compatibility with legacy clients is no longer required. (The only browser that does not support TLSv1.0 is Internet Explorer 6).
To disable SSLv2 and SSLv3:
For Nginx:
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
Screenshots attached for the reference.
Actions
View on HackerOneReport Stats
- Report ID: 116360
- State: Closed
- Substate: resolved
- Upvotes: 3