Description
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Remediation
References
Related Vulnerabilities
ReviveAdserver Session Fixation Vulnerability (CVE-2016-9125)
Beego Framework Incorrect Default Permissions Vulnerability (CVE-2019-16355)
WebLogic CVE-2023-22086 Vulnerability (CVE-2023-22086)
WordPress Plugin Zotpress SQL Injection (6.1.2)
Plone CMS Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-4196)