CVE-2016-9752

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/94622 - () http://www.securityfocus.com/bid/94622 -
References () https://blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html - Vendor Advisory () https://blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html - Vendor Advisory
References () https://github.com/s9y/Serendipity/commit/fbdd50a448ed87ba34ea8c56446b8f1873eadd6f - Issue Tracking, Patch, Third Party Advisory () https://github.com/s9y/Serendipity/commit/fbdd50a448ed87ba34ea8c56446b8f1873eadd6f - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2016-12-01 11:59

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9752

Mitre link : CVE-2016-9752

CVE.ORG link : CVE-2016-9752


JSON object : View

Products Affected

s9y

  • serendipity
CWE
CWE-918

Server-Side Request Forgery (SSRF)