In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/98509 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038520 | Third Party Advisory VDB Entry |
https://codex.wordpress.org/Version_4.7.5 | Patch Release Notes |
https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11 | Patch |
https://twitter.com/skansing/status/865362551097393153 | Third Party Advisory |
https://wordpress.org/news/2017/05/wordpress-4-7-5/ | Patch Vendor Advisory |
https://wpvulndb.com/vulnerabilities/8815 | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4090 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-05-18 14:29
Updated : 2024-02-04 19:11
NVD link : CVE-2017-9066
Mitre link : CVE-2017-9066
CVE.ORG link : CVE-2017-9066
JSON object : View
Products Affected
wordpress
- wordpress
debian
- debian_linux
CWE
CWE-918
Server-Side Request Forgery (SSRF)