In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF.
References
Link | Resource |
---|---|
https://wordpress.org/news/2017/05/wordpress-4-7-5/ | Patch Vendor Advisory |
https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11 | Patch |
https://codex.wordpress.org/Version_4.7.5 | Patch Release Notes |
https://twitter.com/skansing/status/865362551097393153 | Third Party Advisory |
http://www.securityfocus.com/bid/98509 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038520 | Third Party Advisory VDB Entry |
https://wpvulndb.com/vulnerabilities/8815 | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4090 | Third Party Advisory |
Information
Published : 2017-05-18 07:29
Updated : 2019-03-15 04:52
NVD link : CVE-2017-9066
Mitre link : CVE-2017-9066
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
debian
- debian_linux
wordpress
- wordpress