Vulnerability Description
The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Recurly | Recurly Client .Net | 1.0.0 |
Related Weaknesses (CWE)
References
- https://dev.recurly.com/page/net-updatesVendor Advisory
- https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8PatchThird Party Advisory
- https://hackerone.com/reports/288635Permissions Required
- https://dev.recurly.com/page/net-updatesVendor Advisory
- https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8PatchThird Party Advisory
- https://hackerone.com/reports/288635Permissions Required
FAQ
What is CVE-2017-0907?
CVE-2017-0907 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeU...
How severe is CVE-2017-0907?
CVE-2017-0907 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-0907?
Check the references section above for vendor advisories and patch information. Affected products include: Recurly Recurly Client .Net.