Vulnerability Name: | CVE-2021-29922 (CCN-207023) | ||||||||||||||||||
Assigned: | 2021-03-29 | ||||||||||||||||||
Published: | 2021-03-29 | ||||||||||||||||||
Updated: | 2022-11-07 | ||||||||||||||||||
Summary: | library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. | ||||||||||||||||||
CVSS v3 Severity: | 9.1 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) 8.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C)
6.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C)
6.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P)
| ||||||||||||||||||
Vulnerability Type: | CWE-noinfo CWE-20 | ||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-29922 Source: MISC Type: Third Party Advisory https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis Source: MISC Type: Vendor Advisory https://doc.rust-lang.org/beta/std/net/struct.Ipv4Addr.html Source: XF Type: UNKNOWN rust-cve202129922-sec-bypass(207023) Source: MISC Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://github.com/rust-lang/rust/issues/83648 Source: MISC Type: Patch, Third Party Advisory https://github.com/rust-lang/rust/pull/83652 Source: CCN Type: SICK-2021-015 CVE-2021-29922 rust standard library net - Improper Input Validation of octal literals in rust 1.52.0 std::net and below results in indeterminate SSRF & RFI vulnerabilities Source: MISC Type: Exploit, Third Party Advisory https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md Source: GENTOO Type: Third Party Advisory GLSA-202210-09 Source: CCN Type: Rust Web site Rust | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |