First published: Thu Dec 01 2016(Updated: )
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Serendipity (S9Y) Freetag Event | <=2.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-9752 is considered moderate due to the potential for SSRF attacks.
To fix CVE-2016-9752, upgrade your Serendipity installation to version 2.0.5 or later.
CVE-2016-9752 allows attackers to bypass SSRF protections using malformed IP addresses or redirection status codes.
Serendipity versions prior to 2.0.5 are affected by CVE-2016-9752.
In the context of CVE-2016-9752, SSRF refers to Server-Side Request Forgery, a type of attack where an attacker can make requests to internal resources.