First published: Mon Jun 03 2024(Updated: )
The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for <a href="https://access.redhat.com/security/cve/CVE-2023-42282">CVE-2023-42282</a>. References: <a href="https://github.com/indutny/node-ip/issues/150">https://github.com/indutny/node-ip/issues/150</a> <a href="https://github.com/indutny/node-ip/pull/143">https://github.com/indutny/node-ip/pull/143</a> <a href="https://github.com/indutny/node-ip/pull/144">https://github.com/indutny/node-ip/pull/144</a>
Affected Software | Affected Version | How to fix |
---|---|---|
indutny node-ip | <=2.0.1 | |
Node.js |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2284554 is considered critical due to its potential to allow SSRF attacks.
To fix REDHAT-BUG-2284554, you should update the 'node-ip' package to version 2.0.2 or later.
The REDHAT-BUG-2284554 vulnerability affects the 'node-ip' package used in Node.js applications.
REDHAT-BUG-2284554 does not directly allow remote code execution but could facilitate SSRF, leading to other security risks.
Currently, there is no specific workaround for REDHAT-BUG-2284554 aside from updating the vulnerable package.