logo

Database

Javascript Ssl Verification Bypass

Description

Detects when SSL/TLS certificate verification is disabled or bypassed in JavaScript/Node.js applications. This creates security vulnerabilities by allowing connections to untrusted servers and making the application susceptible to man-in-the-middle attacks.

Weakness:

313 - Insecure service configuration - Certificates

Category: Functionality Abuse

Detection Strategy

    Look for imports or requires of the 'https', 'tls', or 'request' modules

    Check for configuration options that disable SSL verification like 'rejectUnauthorized: false'

    Examines HTTPS/TLS client configurations in module methods and request options

    Flags code that explicitly disables certificate validation or uses insecure verification settings

Vulnerable code example

const https = require('node:https');

// Disabling SSL/TLS certificate validation - VULNERABLE
const options = {
  hostname: 'example.com',
  port: 443,
  path: '/',
  method: 'GET',...

✅ Secure code example

const https = require('node:https');

// Secure HTTPS request configuration with enforced certificate validation
const options = {
  hostname: 'example.com',
  port: 443,
  path: '/',
  method: 'GET',...