CVE-2021-29923
Severity
7.5HIGH
EPSS
0.3%
top 51.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 7
Latest updateMay 24
Description
Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
Also affects: Fedora 36
Patches
🔴Vulnerability Details
3📋Vendor Advisories
4Oracle▶
Oracle Oracle TimesTen In-Memory Database Risk Matrix: EM TimesTen plug-in (Go) — CVE-2021-29923↗2022-01-15
Microsoft▶
Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet which (in some situations) allows attackers to bypass access control that is based on IP ad↗2021-08-10
Red Hat▶
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet↗2021-03-22
Debian▶
CVE-2021-29923: golang-1.15 - Go before 1.17 does not properly consider extraneous zero characters at the begi...↗2021