CVE-2021-28918

critical

Description

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.

References

https://www.npmjs.com/package/netmask

https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/

https://security.netapp.com/advisory/ntap-20210528-0010/

https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/

https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md

https://github.com/rs/node-netmask

https://github.com/advisories/GHSA-pch5-whg9-qr2r

Details

Source: Mitre, NVD

Published: 2021-04-01

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical