{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-Net-IPAddress-Util-2021-47156 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2024/cpansa-net-ipaddress-util-2021-47156.json" }, { "category": "external", "summary": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/", "url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/" }, { "category": "external", "summary": "https://metacpan.org/release/Net-IPAddress-Util", "url": "https://metacpan.org/release/Net-IPAddress-Util" }, { "category": "external", "summary": "https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes", "url": "https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes" }, { "category": "external", "summary": "CVE-2021-47156 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47156" } ], "title": "Net-IPAddress-Util vulnerability", "tracking": { "current_release_date": "2024-03-18T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.26" } }, "id": "CPANSA-Net-IPAddress-Util-2021-47156", "initial_release_date": "2024-03-18T00:00:00", "revision_history": [ { "date": "2024-03-18T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/<5.000", "product": { "name": "Net-IPAddress-Util less than 5.000", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "vers:cpan/>=5.000", "product": { "name": "Net-IPAddress-Util greater than or equal 5.000", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Net-IPAddress-Util" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-47156", "cwe": { "id": "CWE-1287", "name": "Improper Validation of Specified Type of Input" }, "notes": [ { "category": "description", "text": "The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.", "title": "Vulnerability Description" } ], "product_status": { "fixed": [ "CSAFPID-0002" ], "known_affected": [ "CSAFPID-0001" ] }, "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] } ] }