Improper parsing of octal bytes in netmask
Critical severity
GitHub Reviewed
Published
Apr 14, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Apr 1, 2021
Reviewed
Apr 13, 2021
Published to the GitHub Advisory Database
Apr 14, 2021
Last updated
Feb 1, 2023
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
❗ NOTE: The fix for this issue was incomplete. A subsequent fix was made in version
2.0.1
which was assigned CVE-2021-29418 / GHSA-pch5-whg9-qr2r. For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.References