Vulnerabilities > CVE-2016-9752 - Server-Side Request Forgery (SSRF) vulnerability in S9Y Serendipity
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
HIGH Availability impact
NONE Summary
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- http://www.securityfocus.com/bid/94622
- http://www.securityfocus.com/bid/94622
- https://blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html
- https://blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html
- https://github.com/s9y/Serendipity/commit/fbdd50a448ed87ba34ea8c56446b8f1873eadd6f
- https://github.com/s9y/Serendipity/commit/fbdd50a448ed87ba34ea8c56446b8f1873eadd6f