Description
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
Remediation
References
https://github.com/rs/node-netmask
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md
https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/
https://www.npmjs.com/package/netmask
https://github.com/advisories/GHSA-pch5-whg9-qr2r
https://security.netapp.com/advisory/ntap-20210528-0010/
https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/
Related Vulnerabilities
CVE-2022-41928 Vulnerability in maven package org.xwiki.platform:xwiki-platform-attachment-ui
CVE-2021-45456 Vulnerability in maven package org.apache.kylin:kylin-server-base
CVE-2017-16024 Vulnerability in npm package sync-exec
CVE-2021-37305 Vulnerability in maven package org.jeecgframework.boot:jeecg-boot-base
CVE-2023-49145 Vulnerability in maven package org.apache.nifi:nifi-jolt-transform-json-ui