First published: Mon Mar 29 2021(Updated: )
The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/netmask | <2.0.1 | 2.0.1 |
IBM Cognos Analytics 11.2.x | <=IBM Cognos Analytics 11.2.x | |
IBM Cognos Analytics 11.1.x | <=IBM Cognos Analytics 11.1.x | |
<2.0.1 | ||
Netmask Project Netmask | <2.0.1 | |
redhat/nodejs-netmask | <2.0.1 | 2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29418 is a vulnerability in the netmask package before version 2.0.1 for Node.js.
CVE-2021-29418 has a severity score of 9.1 (critical).
CVE-2021-29418 in the netmask package for Node.js allows a remote attacker to bypass security restrictions by exploiting improper handling of certain unexpected characters in an IP address string.
CVE-2021-29418 can be exploited by using a specially-crafted argument using octal literals.
To fix CVE-2021-29418, update the netmask package to version 2.0.1 or later.