Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
References
Link | Resource |
---|---|
https://github.com/advisories/GHSA-pch5-whg9-qr2r | Third Party Advisory |
https://github.com/rs/node-netmask | Third Party Advisory |
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md | Exploit Third Party Advisory |
https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/ | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210528-0010/ | Third Party Advisory |
https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/ | Exploit Press/Media Coverage Third Party Advisory |
https://www.npmjs.com/package/netmask | Product Third Party Advisory |
Configurations
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-704 |
Information
Published : 2021-04-01 13:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-28918
Mitre link : CVE-2021-28918
CVE.ORG link : CVE-2021-28918
JSON object : View
Products Affected
netmask_project
- netmask
CWE
CWE-704
Incorrect Type Conversion or Cast