{"id":"CVE-2016-9752","details":"In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.","modified":"2026-04-10T03:55:25.393686Z","published":"2016-12-01T11:59:11.120Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/94622"},{"type":"ADVISORY","url":"https://blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html"},{"type":"FIX","url":"https://github.com/s9y/Serendipity/commit/fbdd50a448ed87ba34ea8c56446b8f1873eadd6f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/s9y/serendipity","events":[{"introduced":"0"},{"last_affected":"55d0cc21cb34ab50bb92ede65b07cc62c30008d6"},{"fixed":"fbdd50a448ed87ba34ea8c56446b8f1873eadd6f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.4"}]}}],"versions":["2.0.0","2.0.1","2.0.2","2.0.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9752.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"}]}