Vulnerability Name: | CVE-2021-29424 (CCN-199158) | ||||||||||||
Assigned: | 2021-03-29 | ||||||||||||
Published: | 2021-03-29 | ||||||||||||
Updated: | 2021-06-08 | ||||||||||||
Summary: | The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-863 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-29424 Source: CCN Type: Dave Rolskys Blog, 2021-03-29 Security Issues in Perl IP Address distros Source: MISC Type: Exploit, Third Party Advisory https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/ Source: XF Type: UNKNOWN perl-netnetmask-cve202129424-sec-bypass(199158) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-3d96cfe6a3 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-be62be8c7c Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-c314017fcc Source: CCN Type: metacpan Web site Net-Netmask Source: MISC Type: Release Notes, Third Party Advisory https://metacpan.org/changes/distribution/Net-Netmask#L11-22 Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210604-0007/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
BACK |