Vulnerability Name: | CVE-2021-29923 (CCN-207025) |
Assigned: | 2021-03-22 |
Published: | 2021-03-22 |
Updated: | 2022-09-14 |
Summary: | Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR. |
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): High Availibility (A): None | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): High Availibility (A): None | 7.3 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) 6.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Complete Availibility (A): None |
|
Vulnerability Type: | CWE-noinfo CWE-20
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2021-29923
Source: MISC Type: Third Party Advisory https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis
Source: XF Type: UNKNOWN golang-cve202129923-sec-bypass(207025)
Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/golang/go/issues/30999
Source: MISC Type: Issue Tracking, Third Party Advisory https://github.com/golang/go/issues/43389
Source: CCN Type: SICK-2021-016 CVE-2021-29923 golang standard library net - Improper Input Validation of octal literals in golang 1.16.2 and below standard library net results in indeterminate SSRF & RFI vulnerabilities
Source: MISC Type: Exploit, Third Party Advisory https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md
Source: MISC Type: Patch, Third Party Advisory https://go-review.googlesource.com/c/go/+/325829/
Source: CCN Type: Golang Web site Go
Source: MISC Type: Vendor Advisory https://golang.org/pkg/net/#ParseCIDR
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-17d004ed71
Source: GENTOO Type: Third Party Advisory GLSA-202208-02
Source: CCN Type: IBM Security Bulletin 6492207 (Watson Discovery) IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in Go
Source: CCN Type: IBM Security Bulletin 6499711 (Cloud Pak for Integration) Operations Dashboard is vulnerable to multiple Go vulnerabilities
Source: CCN Type: IBM Security Bulletin 6501839 (Cloud Pak for Integration) IBM Cloud Pak for Integration is vulnerable to multiple Go vulnerabilities
Source: CCN Type: IBM Security Bulletin 6507037 (App Connect Enterprise Certified Container) IBM App Connect Enterprise Certified Container Integration Servers may be vulnerable to bypassing of access control based on IP addresses due to CVE-2021-29923
Source: CCN Type: IBM Security Bulletin 6513717 (Event Streams) IBM Event Streams affected by multiple vulnerabilities in Golang
Source: CCN Type: IBM Security Bulletin 6524682 (Spectrum Protect Plus) Vulnerabilities in Redis, OpenSSH, Golang Go, and Apache Kafka may affect IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and OpenShift
Source: CCN Type: IBM Security Bulletin 6525250 (Spectrum Copy Data Management) Vulnerabilities in PostgreSQL, Apache, Golang Go, and Linux Kernel affect IBM Spectrum Copy Data Management
Source: CCN Type: IBM Security Bulletin 6550866 (Security Guardium) IBM Security Guardium Insights is affected by multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6565099 (Planning Analytics) IBM Planning Analytics Workspace is affected by security vulnerabilities
Source: CCN Type: IBM Security Bulletin 6574463 (Cloud Private) Security Vulnerabilities affect IBM Cloud Private - Golang (CVE-2021-29923)
Source: CCN Type: IBM Security Bulletin 6574545 (Watson Speech Services Cartridge for Cloud Pak for Data) A vulnerability in Golang Go affects IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data (CVE-2021-29923)
Source: CCN Type: IBM Security Bulletin 6606299 (Cloud Pak for Multicloud Management) IBM Cloud Pak for Multicloud Management Monitoring has multiple vulnerabilities associated with the Go runtime (CVE-2021-29923, CVE-2021-31525, CVE-2021-33194, CVE-2021-33195, CVE-2021-33196, CVE-2021-33197, CVE-2021-33198)
Source: CCN Type: IBM Security Bulletin 6615221 (Robotic Process Automation for Cloud Pak) Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak
Source: CCN Type: IBM Security Bulletin 6831813 (Netcool Operations Insight) Netcool Operations Insight v1.6.6 contains fixes for multiple security vulnerabilities.
Source: CCN Type: IBM Security Bulletin 6831849 (Cloud Pak for Watson AIOps) Multiple Vulnerabilities in CloudPak for Watson AIOPs
Source: CCN Type: IBM Security Bulletin 6958068 (CICS TX Standard) Multiple vulnerabilities in Go may affect IBM CICS TX Standard
Source: CCN Type: Oracle CPUJan2022 Oracle Critical Patch Update Advisory - January 2022
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujan2022.html
|
Vulnerable Configuration: | Configuration 1: cpe:/a:golang:go:*:*:*:*:*:*:*:* (Version < 1.17) Configuration 2: cpe:/a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:* (Version < 21.1.1.1.0) Configuration 3: cpe:/o:fedoraproject:fedora:36:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:golang:go:1.16.0:-:*:*:*:*:*:*AND cpe:/a:ibm:planning_analytics:2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:watson_discovery:2.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.4.1:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.6:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.4.2:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.4:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.4.3:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.7:*:*:*:*:*:*:*OR cpe:/a:ibm:watson_discovery:2.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.8:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_copy_data_management:2.2.13:*:*:*:*:*:*:*OR cpe:/a:ibm:cics_tx:11.1:*:*:*:standard:*:*:*OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.3:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
golang go *
oracle timesten in-memory database *
fedoraproject fedora 36
golang go 1.16.0 -
ibm planning analytics 2.0
ibm watson discovery 2.0.0
ibm spectrum protect plus 10.1.5
ibm cloud private 3.2.1 cd
ibm event streams 2019.4.1
ibm spectrum protect plus 10.1.6
ibm event streams 2019.4.2
ibm event streams 10.0.0
ibm cloud private 3.2.2 cd
ibm app connect enterprise certified container 1.0.0
ibm app connect enterprise certified container 1.0.1
ibm app connect enterprise certified container 1.0.2
ibm app connect enterprise certified container 1.0.3
ibm app connect enterprise certified container 1.0.4
ibm event streams 2019.4.3
ibm event streams 10.1.0
ibm spectrum protect plus 10.1.7
ibm watson discovery 2.2.1
ibm event streams 10.2.0
ibm spectrum protect plus 10.1.8
ibm event streams 10.3.0
ibm event streams 10.3.1
ibm spectrum copy data management 2.2.13
ibm cics tx 11.1
ibm robotic process automation for cloud pak 21.0.1
ibm robotic process automation for cloud pak 21.0.2
ibm robotic process automation for cloud pak 21.0.3