In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
{ "versions": [ { "introduced": "0" }, { "last_affected": "2.0.4" } ] }
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9752.json"