First published: Sun Aug 07 2016(Updated: )
WordPress before 4.5 does not consider octal and hexadecimal IP address formats when determining an intranet address, which allows remote attackers to bypass an intended SSRF protection mechanism via a crafted address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=4.4.4 | |
WordPress | <4.5 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4029 has a medium severity due to its potential for SSRF attacks.
To fix CVE-2016-4029, upgrade your WordPress installation to version 4.5 or higher.
CVE-2016-4029 affects WordPress versions prior to 4.5.
Yes, CVE-2016-4029 can be exploited remotely, allowing attackers to bypass SSRF protections.
CVE-2016-4029 affects octal and hexadecimal IP address formats.