CVE-2017-0906
moderate-risk
Published 2017-11-13
The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource.get" method that could result in compromise of API keys or other critical resources.
Do I need to act?
-
0.52% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 049c74699ce93cf126feff06d632ea63fba36742
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (5)
Recurly Client Python
Recurly Client Python
Recurly Client Python
Recurly Client Python
Recurly Client Python
Affected Vendors
References (6)
Vendor Advisory
https://dev.recurly.com/page/python-updates
Permissions Required
https://hackerone.com/reports/288635
Vendor Advisory
https://dev.recurly.com/page/python-updates
Permissions Required
https://hackerone.com/reports/288635
46
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
2/34 · Minimal
Exposure
12/34 · Low