High severity8.6NVD Advisory· Published Dec 1, 2016· Updated May 6, 2026
CVE-2016-9752
CVE-2016-9752
Description
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/s9y/Serendipity/commit/fbdd50a448ed87ba34ea8c56446b8f1873eadd6fnvdIssue TrackingPatchThird Party Advisory
- blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.htmlnvdVendor Advisory
- www.securityfocus.com/bid/94622nvd
News mentions
0No linked articles in our index yet.