CVE-2017-0907 – recurly-api-client
Package
Manager: nuget
Name: recurly-api-client
Vulnerable Version: >=0 <1.0.1 || >=1.1.0 <1.1.10 || >=1.2.0 <1.2.8 || >=1.3.0 <1.3.2 || >=1.4.0 <1.4.14 || >=1.5.0 <1.5.3 || >=1.6.0 <1.6.2 || =1.7.0 || >=1.7.0 <1.7.1 || =1.8.0 || >=1.8.0 <1.8.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
EPSS: 0.00519 pctl0.65867
Details
Critical severity vulnerability that affects recurly-api-client The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources.
Metadata
Created: 2018-10-16T17:35:04Z
Modified: 2020-06-16T22:03:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-xpwp-rq3x-x6v7/GHSA-xpwp-rq3x-x6v7.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-xpwp-rq3x-x6v7
Finding: F100
Auto approve: 1