First published: Mon Feb 19 2024(Updated: )
Emre Durmaz discovered that NPM IP package incorrectly distinguished between private and public IP addresses. A remote attacker could possibly use this issue to perform Server-Side Request Forgery (SSRF) attacks.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/node-ip | <2.0.0+~1.1.0-1ubuntu0.1 | 2.0.0+~1.1.0-1ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/node-ip | <1.1.5+~1.1.0-1ubuntu0.1~esm1 | 1.1.5+~1.1.0-1ubuntu0.1~esm1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/node-ip | <1.1.5-5ubuntu0.1~esm1 | 1.1.5-5ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/node-ip | <1.1.5-1ubuntu0.1~esm1 | 1.1.5-1ubuntu0.1~esm1 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability USN-6643-1 has a high severity level due to the potential for Server-Side Request Forgery (SSRF) attacks.
To mitigate USN-6643-1, update the node-ip package to the remedied versions provided in the advisory for your Ubuntu release.
USN-6643-1 affects multiple versions of node-ip prior to the remedied versions specified for Ubuntu 18.04, 20.04, 22.04, and 23.10.
The vulnerability USN-6643-1 was discovered by Emre Durmaz.
A remote attacker could exploit USN-6643-1 to perform Server-Side Request Forgery (SSRF) attacks.