Bypassing SSRF Protection in Serendipity before 2.0.5
CVE-2016-9752 · MEDIUM Severity
AV:N/AC:L/AU:N/C:N/I:P/A:N
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Learn more about our Web Application Penetration Testing UK.