In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2016-12-01T11:00:00

Updated: 2016-12-26T00:57:01

Reserved: 2016-12-01T00:00:00


Link: CVE-2016-9752

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2016-12-01T11:59:11.120

Modified: 2016-12-03T03:27:52.223


Link: CVE-2016-9752

JSON object: View

cve-icon Redhat Information

No data.

CWE