cvelist/2021/47xxx/CVE-2021-47156.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2024-04-01 20:48:19 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-47156",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/",
"refsource": "MISC",
"name": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/"
},
{
"url": "https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes",
"refsource": "MISC",
"name": "https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes"
},
{
"url": "https://metacpan.org/release/Net-IPAddress-Util",
"refsource": "MISC",
"name": "https://metacpan.org/release/Net-IPAddress-Util"
}
]
}
}