SynopsisThe remote web server uses a version of PHP that is potentially vulnerable to man-in-the-middle attacks.
DescriptionAccording to its banner, the version of PHP 5.4.x installed on the remote host is prior to 5.4.11. It is, therefore, potentially affected by a weakness in the cURL extension that can allow SSL spoofing and man-in-the-middle attacks.
When attempting to validate a certificate, the cURL library (libcurl) fails to verify that a server hostname matches a domain name in an X.509 certificate's 'Subject Common Name' (CN) or 'SubjectAltName'.
Note that this plugin does not attempt to verify whether the PHP install has been built with the cURL extention but instead relies only on PHP's self-reported version number.
SolutionUpgrade to PHP version 5.4.11 or later.