Описание
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Ссылки
- Vendor Advisory
- Issue TrackingPatchThird Party Advisory
- Vendor Advisory
- Issue TrackingPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.4 (включая)
cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:*
EPSS
Процентиль: 40%
0.00185
Низкий
8.6 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-918
Связанные уязвимости
CVSS3: 8.6
ubuntu
около 9 лет назад
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
CVSS3: 8.6
debian
около 9 лет назад
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by ...
CVSS3: 8.6
github
больше 3 лет назад
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
EPSS
Процентиль: 40%
0.00185
Низкий
8.6 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-918