Description
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
Remediation
References
https://github.com/advisories/GHSA-pch5-whg9-qr2r
https://github.com/rs/node-netmask
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md
https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/
https://security.netapp.com/advisory/ntap-20210528-0010/
https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/
https://www.npmjs.com/package/netmask
Related Vulnerabilities
CVE-2021-43571 Vulnerability in npm package starkbank-ecdsa
CVE-2018-1002204 Vulnerability in maven package org.webjars:adm-zip
CVE-2023-34612 Vulnerability in maven package com.helger.commons:ph-json
CVE-2019-20365 Vulnerability in maven package org.igniterealtime.openfire:xmppserver
CVE-2022-40664 Vulnerability in maven package org.apache.shiro:shiro-core