{"id":"CVE-2017-0907","details":"The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of \"Uri.EscapeUriString\" that could result in compromise of API keys or other critical resources.","aliases":["GHSA-xpwp-rq3x-x6v7"],"modified":"2026-03-03T01:01:50.113600Z","published":"2017-11-13T17:29:00.490Z","references":[{"type":"ADVISORY","url":"https://dev.recurly.com/page/net-updates"},{"type":"ADVISORY","url":"https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1"},{"type":"REPORT","url":"https://hackerone.com/reports/288635"},{"type":"FIX","url":"https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/recurly/recurly-client-dotnet","events":[{"introduced":"0"},{"fixed":"9eef460c0084afd5c24d66220c8b7a381cf9a1f1"}]}],"versions":["1.0.0","1.0.0-beta1","1.0.0-beta2","1.0.0-beta3","1.0.0-rc1","1.0.0.1","1.0.0.2","1.0.0.3","1.0.0.4","1.1.0","1.1.1","1.1.4","1.1.5","1.1.6","1.1.7","1.1.8","1.1.9","1.2.0","1.2.1","1.2.2","1.2.5","1.2.6","1.2.7","1.3.0","1.3.1","1.4.0","1.4.1","1.4.10","1.4.11","1.4.12","1.4.13","1.4.2","1.4.3","1.4.4","1.4.5","1.4.6","1.4.7","1.4.8","1.4.9","1.5.0","1.6.0","1.6.1","1.7.0","1.8.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-0907.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}