The wp_http_validate_url function in wp-includes/http.php in WordPress before 4.4.2 allows remote attackers to conduct server-side request forgery (SSRF) attacks via a zero value in the first octet of an IPv4 address in the u parameter to wp-admin/press-this.php.
References
Configurations
History
21 Nov 2024, 02:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2016/dsa-3472 - | |
References | () http://www.securityfocus.com/bid/82454 - | |
References | () http://www.securitytracker.com/id/1034933 - | |
References | () https://codex.wordpress.org/Version_4.4.2 - Patch | |
References | () https://core.trac.wordpress.org/changeset/36435 - | |
References | () https://hackerone.com/reports/110801 - Exploit | |
References | () https://news.ycombinator.com/item?id=20433070 - | |
References | () https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/ - Patch, Vendor Advisory | |
References | () https://wpvulndb.com/vulnerabilities/8376 - |
Information
Published : 2016-05-22 01:59
Updated : 2024-11-21 02:48
NVD link : CVE-2016-2222
Mitre link : CVE-2016-2222
CVE.ORG link : CVE-2016-2222
JSON object : View
Products Affected
wordpress
- wordpress
CWE