GHSA-4c7m-wxvm-r7gc

Suggest an improvement
Source
https://github.com/advisories/GHSA-4c7m-wxvm-r7gc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-4c7m-wxvm-r7gc/GHSA-4c7m-wxvm-r7gc.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-4c7m-wxvm-r7gc
Aliases
Published
2021-04-14T15:03:16Z
Modified
2025-01-08T08:12:05.194239Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Improper parsing of octal bytes in netmask
Details

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.

:exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version 2.0.1 which was assigned CVE-2021-29418 / GHSA-pch5-whg9-qr2r. For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.

Database specific
{
    "github_reviewed_at": "2021-04-13T16:13:23Z",
    "nvd_published_at": "2021-04-01T13:15:00Z",
    "severity": "CRITICAL",
    "cwe_ids": [
        "CWE-20"
    ],
    "github_reviewed": true
}
References

Affected packages

npm / netmask

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0