Vulnerability Description
The wp_http_validate_url function in wp-includes/http.php in WordPress before 4.4.2 allows remote attackers to conduct server-side request forgery (SSRF) attacks via a zero value in the first octet of an IPv4 address in the u parameter to wp-admin/press-this.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 4.4.1 |
References
- http://www.debian.org/security/2016/dsa-3472
- http://www.securityfocus.com/bid/82454
- http://www.securitytracker.com/id/1034933
- https://codex.wordpress.org/Version_4.4.2Patch
- https://core.trac.wordpress.org/changeset/36435
- https://hackerone.com/reports/110801Exploit
- https://news.ycombinator.com/item?id=20433070
- https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-relePatchVendor Advisory
- https://wpvulndb.com/vulnerabilities/8376
- http://www.debian.org/security/2016/dsa-3472
- http://www.securityfocus.com/bid/82454
- http://www.securitytracker.com/id/1034933
- https://codex.wordpress.org/Version_4.4.2Patch
- https://core.trac.wordpress.org/changeset/36435
- https://hackerone.com/reports/110801Exploit
FAQ
What is CVE-2016-2222?
CVE-2016-2222 is a vulnerability with a CVSS score of 8.6 (HIGH). The wp_http_validate_url function in wp-includes/http.php in WordPress before 4.4.2 allows remote attackers to conduct server-side request forgery (SSRF) attacks via a zero value in the first octet of...
How severe is CVE-2016-2222?
CVE-2016-2222 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2222?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.