Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRjN20td3h2bS1yN2dj

Improper parsing of octal bytes in netmask

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.

❗ NOTE: The fix for this issue was incomplete. A subsequent fix was made in version 2.0.1 which was assigned CVE-2021-29418 / GHSA-pch5-whg9-qr2r. For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.

Permalink: https://github.com/advisories/GHSA-4c7m-wxvm-r7gc
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRjN20td3h2bS1yN2dj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 3 years ago
Updated: over 1 year ago


CVSS Score: 9.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Identifiers: GHSA-4c7m-wxvm-r7gc, CVE-2021-28918
References: Repository: https://github.com/rs/node-netmask
Blast Radius: 47.8

Affected Packages

npm:netmask
Dependent packages: 468
Dependent repositories: 177,363
Downloads: 30,409,418 last month
Affected Version Ranges: < 1.1.0
Fixed in: 1.1.0
All affected versions: 0.0.0, 0.0.1, 0.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6
All unaffected versions: 2.0.0, 2.0.1, 2.0.2