CVE-2021-29921

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.
References
Link Resource
https://bugs.python.org/issue36384 Issue Tracking Patch Vendor Advisory
https://docs.python.org/3/library/ipaddress.html Vendor Advisory
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst Third Party Advisory
https://github.com/python/cpython/pull/12577 Patch Third Party Advisory
https://github.com/python/cpython/pull/25099 Patch Third Party Advisory
https://github.com/sickcodes Third Party Advisory
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md Exploit Third Party Advisory
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html Vendor Advisory
https://security.gentoo.org/glsa/202305-02
https://security.netapp.com/advisory/ntap-20210622-0003/ Third Party Advisory
https://sick.codes/sick-2021-014 Exploit Third Party Advisory
https://www.oracle.com//security-alerts/cpujul2021.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html Patch Third Party Advisory
https://bugs.python.org/issue36384 Issue Tracking Patch Vendor Advisory
https://docs.python.org/3/library/ipaddress.html Vendor Advisory
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst Third Party Advisory
https://github.com/python/cpython/pull/12577 Patch Third Party Advisory
https://github.com/python/cpython/pull/25099 Patch Third Party Advisory
https://github.com/sickcodes Third Party Advisory
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md Exploit Third Party Advisory
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html Vendor Advisory
https://security.gentoo.org/glsa/202305-02
https://security.netapp.com/advisory/ntap-20210622-0003/ Third Party Advisory
https://sick.codes/sick-2021-014 Exploit Third Party Advisory
https://www.oracle.com//security-alerts/cpujul2021.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.1.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

History

21 Nov 2024, 06:01

Type Values Removed Values Added
References () https://bugs.python.org/issue36384 - Issue Tracking, Patch, Vendor Advisory () https://bugs.python.org/issue36384 - Issue Tracking, Patch, Vendor Advisory
References () https://docs.python.org/3/library/ipaddress.html - Vendor Advisory () https://docs.python.org/3/library/ipaddress.html - Vendor Advisory
References () https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst - Third Party Advisory () https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst - Third Party Advisory
References () https://github.com/python/cpython/pull/12577 - Patch, Third Party Advisory () https://github.com/python/cpython/pull/12577 - Patch, Third Party Advisory
References () https://github.com/python/cpython/pull/25099 - Patch, Third Party Advisory () https://github.com/python/cpython/pull/25099 - Patch, Third Party Advisory
References () https://github.com/sickcodes - Third Party Advisory () https://github.com/sickcodes - Third Party Advisory
References () https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md - Exploit, Third Party Advisory () https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md - Exploit, Third Party Advisory
References () https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html - Vendor Advisory () https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html - Vendor Advisory
References () https://security.gentoo.org/glsa/202305-02 - () https://security.gentoo.org/glsa/202305-02 -
References () https://security.netapp.com/advisory/ntap-20210622-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210622-0003/ - Third Party Advisory
References () https://sick.codes/sick-2021-014 - Exploit, Third Party Advisory () https://sick.codes/sick-2021-014 - Exploit, Third Party Advisory
References () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujul2022.html - () https://www.oracle.com/security-alerts/cpujul2022.html -
References () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory

03 May 2023, 11:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202305-02 -

25 Jul 2022, 18:15

Type Values Removed Values Added
References
  • (N/A) https://www.oracle.com/security-alerts/cpujul2022.html -

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-Other

12 May 2022, 14:06

Type Values Removed Values Added
References (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory
CPE cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*

20 Apr 2022, 00:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html -

01 Mar 2022, 17:17

Type Values Removed Values Added
CPE cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:21.1.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.2:*:*:*:enterprise:*:*:*
References (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Third Party Advisory (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory
References (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory

07 Feb 2022, 16:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpujan2022.html -

29 Nov 2021, 16:36

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20210622-0003/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20210622-0003/ - Third Party Advisory
References (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Third Party Advisory

20 Oct 2021, 11:16

Type Values Removed Values Added
References
  • (N/A) https://www.oracle.com//security-alerts/cpujul2021.html -
  • (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html -

22 Jun 2021, 09:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210622-0003/ -

24 May 2021, 05:15

Type Values Removed Values Added
Summary Improper input validation of octal strings in Python stdlib ipaddress 3.10 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. IP address octects are left stripped instead of evaluated as valid IP addresses. In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.

Information

Published : 2021-05-06 13:15

Updated : 2024-11-21 06:01


NVD link : CVE-2021-29921

Mitre link : CVE-2021-29921

CVE.ORG link : CVE-2021-29921


JSON object : View

Products Affected

oracle

  • communications_cloud_native_core_automated_test_suite
  • zfs_storage_appliance_kit
  • graalvm
  • communications_cloud_native_core_network_slice_selection_function
  • communications_cloud_native_core_binding_support_function

python

  • python