In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF.
References
Configurations
History
21 Nov 2024, 03:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/98509 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038520 - Third Party Advisory, VDB Entry | |
References | () https://codex.wordpress.org/Version_4.7.5 - Patch, Release Notes | |
References | () https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11 - Patch | |
References | () https://twitter.com/skansing/status/865362551097393153 - Third Party Advisory | |
References | () https://wordpress.org/news/2017/05/wordpress-4-7-5/ - Patch, Vendor Advisory | |
References | () https://wpvulndb.com/vulnerabilities/8815 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4090 - Third Party Advisory |
Information
Published : 2017-05-18 14:29
Updated : 2024-11-21 03:35
NVD link : CVE-2017-9066
Mitre link : CVE-2017-9066
CVE.ORG link : CVE-2017-9066
JSON object : View
Products Affected
debian
- debian_linux
wordpress
- wordpress
CWE
CWE-918
Server-Side Request Forgery (SSRF)