First published: Wed Mar 31 2021(Updated: )
The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
data validate | <=0.29 | |
NetApp SnapCenter |
https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29662 is considered a medium severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2021-29662, update the Data::Validate::IP module to version 0.30 or later.
CVE-2021-29662 can be exploited to bypass IP address-based access controls.
The vulnerability affects the Data::Validate::IP module up to version 0.29 and potentially other software relying on it.
Yes, CVE-2021-29662 can compromise your server's security if IP-based access control mechanisms are utilized.