In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2016-12-01T11:00:00

Updated: 2024-08-06T02:59:03.466Z

Reserved: 2016-12-01T00:00:00

Link: CVE-2016-9752

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2016-12-01T11:59:11.120

Modified: 2024-11-21T03:01:42.563

Link: CVE-2016-9752

cve-icon Redhat

No data.