ID CVE-2021-29662
Summary The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
References
Vulnerable Configurations
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:-:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:-:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.15:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.15:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.16:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.16:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.17:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.17:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.18:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.18:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.19:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.19:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.20:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.20:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.21:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.21:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.22:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.22:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.23:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.23:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.24:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.24:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.25:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.25:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.26:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.26:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.27:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.27:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.28:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.28:*:*:*:*:perl:*:*
  • cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.29:*:*:*:*:perl:*:*
    cpe:2.3:a:data\:\:validate\:\:ip_project:data\:\:validate\:\:ip:0.29:*:*:*:*:perl:*:*
  • cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 08-08-2023 - 14:21)
Impact:
Exploitability:
CWE CWE-704
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
Last major update 08-08-2023 - 14:21
Published 31-03-2021 - 18:15
Last modified 08-08-2023 - 14:21
Back to Top