You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
Description:
The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.
VULNERABILITY - netmask (1.0.6)
View issue on FOSSA
Component URL
https://www.npmjs.com/package/netmask
Affected Projects
Issue
Vulnerability - CVE-2021-28918
Severity:
Critical (9.1)
Description:
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
Remediation:
Upgrade to version 2.0.1
Vulnerability - CVE-2021-29418
Severity:
Medium (5.3)
Description:
The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.
Remediation:
Upgrade to version 2.0.1
Generated by FOSSA on 03/16/2022
Reported by FOSSA user: pbelton
Reported Issue: https://app.fossa.com/projects/git%2Bgithub.com%2FeGain%2Fegain-conversation-hub-sentiment-analysis/refs/branch/main/1b651e9e88259a0085a54d006099c41033e8e5c8/issues/security/796681?revisionScanId=11858268&status=any
The text was updated successfully, but these errors were encountered: