First published: Mon Mar 29 2021(Updated: )
Node.js netmask module is vulnerable to server-side request forgery, caused by the improper handling of mixed-format IP addresses. By using a specially-crafted argument using octal literals, an attacker could exploit this vulnerability to conduct SSRF, RFI, and LFI attacks to gain access to intranets, VPNs, containers, adjacent VPC instances, or LAN hosts.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cognos Analytics 11.2.x | <=IBM Cognos Analytics 11.2.x | |
IBM Cognos Analytics 11.1.x | <=IBM Cognos Analytics 11.1.x | |
Netmask Project Netmask | <=1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28918 is a vulnerability in the Node.js netmask module that allows for server-side request forgery (SSRF) attacks.
CVE-2021-28918 has a severity rating of 9.1 (critical).
The Netmask Project's Netmask module version 1.0.6, IBM Cognos Analytics 11.2.x, and IBM Cognos Analytics 11.1.x are affected by CVE-2021-28918.
CVE-2021-28918 allows attackers to conduct SSRF, RFI, and LFI attacks to gain unauthorized access to intranet resources.
To mitigate CVE-2021-28918, update the Netmask module to a version that has fixed the vulnerability or apply the necessary security patches provided by IBM for Cognos Analytics 11.2.x and 11.1.x.