In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T02:59:03.466Z
Reserved: 2016-12-01T00:00:00
Link: CVE-2016-9752

No data.

Status : Deferred
Published: 2016-12-01T11:59:11.120
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-9752

No data.