### [CVE-2016-9752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9752) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code. ### POC #### Reference - https://blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html #### Github No PoCs found on GitHub currently.