.. / CVE-2021-28918

Exploit for Netmask NPM Package - Server-Side Request Forgery (CVE-2021-28918)

Description:

Netmask NPM Package is susceptible to server-side request forgery because of improper input validation of octal strings in netmask npm package. This allows unauthenticated remote attackers to perform indeterminate SSRF, remote file inclusion, and local file inclusion attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.

Nuclei Template

View the template here CVE-2021-28918.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-28918.yaml
Copy

References:

https://github.com/rs/node-netmask
https://github.com/advisories/GHSA-pch5-whg9-qr2r
https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md
https://nvd.nist.gov/vuln/detail/CVE-2021-28918