The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
References
Link | Resource |
---|---|
https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/ | Exploit Third Party Advisory |
https://github.com/houseabsolute/Data-Validate-IP | Product Third Party Advisory |
https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e | Patch Third Party Advisory |
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md | Exploit Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210604-0002/ | Third Party Advisory |
https://sick.codes/sick-2021-018/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-03-31T17:28:16
Updated: 2021-06-04T09:06:16
Reserved: 2021-03-31T00:00:00
Link: CVE-2021-29662
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-03-31T18:15:16.037
Modified: 2023-08-08T14:21:49.707
Link: CVE-2021-29662
JSON object: View
Redhat Information
No data.
CWE