{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-Data-Validate-IP-2021-01 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2021/cpansa-data-validate-ip-2021-01.json" }, { "category": "external", "summary": "https://security.netapp.com/advisory/ntap-20210604-0002/", "url": "https://security.netapp.com/advisory/ntap-20210604-0002/" }, { "category": "external", "summary": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/", "url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/" }, { "category": "external", "summary": "https://github.com/houseabsolute/Data-Validate-IP", "url": "https://github.com/houseabsolute/Data-Validate-IP" }, { "category": "external", "summary": "https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e", "url": "https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e" }, { "category": "external", "summary": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md", "url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md" }, { "category": "external", "summary": "https://sick.codes/sick-2021-018/", "url": "https://sick.codes/sick-2021-018/" }, { "category": "external", "summary": "CVE-2021-29662 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29662" } ], "title": "Data-Validate-IP vulnerability", "tracking": { "current_release_date": "2021-03-31T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.26" } }, "id": "CPANSA-Data-Validate-IP-2021-01", "initial_release_date": "2021-03-31T00:00:00", "revision_history": [ { "date": "2021-03-31T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/<=0.29", "product": { "name": "Data-Validate-IP less than or equal 0.29", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "vers:cpan/>0.29", "product": { "name": "Data-Validate-IP greater than 0.29", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Data-Validate-IP" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29662", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "description", "text": "The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.", "title": "Vulnerability Description" } ], "product_status": { "fixed": [ "CSAFPID-0002" ], "known_affected": [ "CSAFPID-0001" ] }, "scores": [ { "cvss_v2": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] } ] }