Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
:exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version 2.0.1
which was assigned CVE-2021-29418 / GHSA-pch5-whg9-qr2r. For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.
github.com/advisories/GHSA-pch5-whg9-qr2r
github.com/rs/node-netmask
github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021
github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md
nvd.nist.gov/vuln/detail/CVE-2021-28918
rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects
security.netapp.com/advisory/ntap-20210528-0010
www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications
www.npmjs.com/package/netmask