CVE-2016-9752

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-12-01 11:59

Updated : 2024-02-28 15:44


NVD link : CVE-2016-9752

Mitre link : CVE-2016-9752

CVE.ORG link : CVE-2016-9752


JSON object : View

Products Affected

s9y

  • serendipity
CWE
CWE-918

Server-Side Request Forgery (SSRF)