Server-Side Request Forgery (SSRF) Affecting recurly-api-client package, versions [,1.0.1)[1.1,1.1.10)[1.2,1.2.8)[1.3,1.3.2)[1.4,1.4.14)[1.5,1.5.3)[1.6,1.6.2)[1.7,1.7.1)[1.8,1.8.1)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.38% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DOTNET-RECURLYAPICLIENT-60120
  • published20 Nov 2017
  • disclosed6 Nov 2017
  • creditUnknown

Introduced: 6 Nov 2017

CVE-2017-0907  (opens in a new tab)
CWE-918  (opens in a new tab)

Overview

recurly-api-client is an API Client for Recurly - Subscription billing automation.

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) attacks. The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of Uri.EscapeUriString that could result in compromise of API keys or other critical resources.

CVSS Scores

version 3.1