Vulnerability CVE-2016-9752


Published: 2016-12-01

Description:
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
S9Y -> Serendipity 

 References:
http://www.securityfocus.com/bid/94622
https://blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html
https://github.com/s9y/Serendipity/commit/fbdd50a448ed87ba34ea8c56446b8f1873eadd6f

Copyright 2024, cxsecurity.com

 

Back to Top