Description
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/94622
Vendor Advisory x_refsource_confirm
https://blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/s9y/Serendipity/commit/fbdd50a448ed87ba34ea8c56446b8f1873eadd6f
Scores
CVSS v3
8.6
EPSS
0.0019
EPSS Percentile
39.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Details
CWE
CWE-918
Status
published
Products (1)
s9y/serendipity
< 2.0.4
Published
Dec 01, 2016
Tracked Since
Feb 18, 2026