CVE-2016-9752
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Date published : 2016-12-01
http://www.securityfocus.com/bid/94622
https://blog.s9y.org/archives/271-Serendipity-2.0.5-and-2.1-beta3-released.html