Clear-text protocols such as
telnet or non-secure
http lack encryption of transported data, as well as
the capability to build an authenticated connection. It means that an attacker able to sniff traffic from the network can read, modify or corrupt the
transported content. These protocols are not secure as they expose applications to an extensive range of risks:
- Sensitive data exposure
- Traffic redirected to a malicious endpoint
- Malware infected software update or installer
- Execution of client side code
- Corruption of critical information
Even in the context of isolated networks like offline environments or segmented cloud environments, the insider threat exists. Thus, attacks
involving communications being sniffed or tampered with can still happen.
For example, attackers could successfully compromise prior security layers by:
- Bypassing isolation mechanisms
- Compromising a component of the network
- Getting the credentials of an internal IAM account (either from a service account or an actual person)
In such cases, encrypting communications would decrease the chances of attackers to successfully leak data or steal credentials from other network
components. By layering various security practices (segmentation and encryption, for example), the application will follow the
Note that using the
http protocol is being deprecated by major web browsers.
In the past, it has led to the following vulnerabilities:
Ask Yourself Whether
- Application data needs to be protected against falsifications or leaks when transiting over the network.
- Application data transits over a network that is considered untrusted.
- Compliance rules require the service to encrypt data in transit.
- Your application renders web pages with a relaxed mixed content policy.
- OS level protections against clear-text traffic are deactivated.
There is a risk if you answered yes to any of those questions.
Recommended Secure Coding Practices
- Make application data transit over a secure, authenticated and encrypted protocol like TLS or SSH. Here are a few alternatives to the most
common clear-text protocols:
ssh as an alternative to
ftps instead of
https instead of
STARTTLS instead of clear-text SMTP
- Enable encryption of cloud components communications whenever it’s possible.
- Configure your application to block mixed content when rendering web pages.
- If available, enforce OS level deactivation of all clear-text traffic
It is recommended to secure all transport channels (even local network) as it can take a single non secure connection to compromise an entire
application or system.
Sensitive Code Example
$url = "http://example.com"; // Sensitive
$url = "ftp://email@example.com"; // Sensitive
$url = "telnet://firstname.lastname@example.org"; // Sensitive
$con = ftp_connect('example.com'); // Sensitive
$trans = (new Swift_SmtpTransport('XXX', 1234)); // Sensitive
$mailer = new PHPMailer(true); // Sensitive
define( 'FORCE_SSL_ADMIN', false); // Sensitive
define( 'FORCE_SSL_LOGIN', false); // Sensitive
$url = "https://example.com"; // Compliant
$url = "sftp://email@example.com"; // Compliant
$url = "ssh://firstname.lastname@example.org"; // Compliant
$con = ftp_ssl_connect('example.com'); // Compliant
$trans = (new Swift_SmtpTransport('smtp.example.org', 1234))
->setEncryption('tls') // Compliant
$mailer = new PHPMailer(true);
$mailer->SMTPSecure = 'tls'; // Compliant
define( 'FORCE_SSL_ADMIN', true); // Compliant
define( 'FORCE_SSL_LOGIN', true); // Compliant
No issue is reported for the following cases because they are not considered sensitive:
- Insecure protocol scheme followed by loopback addresses like 127.0.0.1 or