[Bug 1961865] New: perl-Net-CIDR-Lite: Incorrect handling of IP address with leading zeros in IP octets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1961865

            Bug ID: 1961865
           Summary: perl-Net-CIDR-Lite: Incorrect handling  of IP address
                    with leading zeros in IP octets
           Product: Security Response
          Hardware: All
                OS: Linux
            Status: NEW
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-team@xxxxxxxxxx
          Reporter: thoger@xxxxxxxxxx
                CC: paul@xxxxxxxxxxxx, perl-devel@xxxxxxxxxxxxxxxxxxxxxxx,
                    pzhukov@xxxxxxxxxx, steve@xxxxxxxxx
  Target Milestone: ---
    Classification: Other



It was discovered that the perl Net-CIDR-Lite module did not correctly handle
IP addresses with IP octets containing leading zeros.  Leading zeros were
ignored, while the underlying system can treat such octets as octal numbers and
interpret them differently.  For example, IP address of 010.0.0.1 was
considered by Net-CIDR-Lite to be the same address as 10.0.0.1, while system
may consider it to be IP address 8.0.0.1.

Reference:

https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/#net-cidr-litehttpsmetacpanorgreleasenet-cidr-lite

This issue was fixed in Net-CIDR-Lite version 0.22 via this change:

https://metacpan.org/diff/file?target=STIGTSP/Net-CIDR-Lite-0.22/Lite.pm&source=DOUGW%2FNet-CIDR-Lite-0.21%2FLite.pm

An example of a potentially vulnerable use case can be found in the
SpamAssassin's URILocalBL plugin:

https://svn.apache.org/viewvc/spamassassin/tags/spamassassin_release_3_4_6/lib/Mail/SpamAssassin/Plugin/URILocalBL.pm?view=markup

It allows checking URLs extracted from emails against locally defined blacklist
of IP ranges.  IP addresses to check are typically obtained by resolving host
names used in URLs.  However, URLs with IP addresses can be used directly. 
Hence, this issue could potentially lead to a bypass of the defined blacklist. 
Note that this plugin does not seem to be affected due to the use of a strict
regular expression used to determine if URL contains host name or IP address. 
That regular expression does not consider addresses with leading zeros as valid
IP addresses and performs their resolution, translating the IP string to how
system interprets it.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite Information]

  Powered by Linux