Bypassing SSRF Protection in Serendipity before 2.0.5

Bypassing SSRF Protection in Serendipity before 2.0.5

CVE-2016-9752 · MEDIUM Severity

AV:N/AC:L/AU:N/C:N/I:P/A:N

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

Learn more about our Web Application Penetration Testing UK.