{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-Net-IPV4Addr-2021-47155 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2024/cpansa-net-ipv4addr-2021-47155.json" }, { "category": "external", "summary": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/", "url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/" }, { "category": "external", "summary": "https://metacpan.org/release/Net-IPAddress-Util", "url": "https://metacpan.org/release/Net-IPAddress-Util" }, { "category": "external", "summary": "https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes", "url": "https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes" }, { "category": "external", "summary": "CVE-2021-47155 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47155" } ], "title": "Net-IPv4Addr vulnerability", "tracking": { "current_release_date": "2024-03-18T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.26" } }, "id": "CPANSA-Net-IPV4Addr-2021-47155", "initial_release_date": "2024-03-18T00:00:00", "revision_history": [ { "date": "2024-03-18T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/>=0.10", "product": { "name": "Net-IPv4Addr greater than or equal 0.10", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Net-IPv4Addr" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-47155", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "description", "text": "The Net::IPV4Addr module 0.10 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.", "title": "Vulnerability Description" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] } ] }