CVE-2017-0907
Severity CVSS v4.0:
Pending analysis
Type:
CWE-918
Server-Side Request Forgery (SSRF)
Publication date:
13/11/2017
Last modified:
20/04/2025
Description
The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:recurly:recurly_client_.net:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.0.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.0.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.0.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.0.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.0.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.0.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.0.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:recurly:recurly_client_.net:1.1.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://dev.recurly.com/page/net-updates
- https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1
- https://hackerone.com/reports/288635
- https://dev.recurly.com/page/net-updates
- https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1
- https://hackerone.com/reports/288635



