8.7 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
57.2%
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
www.securityfocus.com/bid/94622
blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html
github.com/s9y/Serendipity/commit/fbdd50a448ed87ba34ea8c56446b8f1873eadd6f