In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2016-12-01T11:00:00
Updated: 2024-08-06T02:59:03.466Z
Reserved: 2016-12-01T00:00:00
Link: CVE-2016-9752
Vulnrichment
No data.
NVD
Status : Modified
Published: 2016-12-01T11:59:11.120
Modified: 2024-11-21T03:01:42.563
Link: CVE-2016-9752
Redhat
No data.