CVE-2021-29921

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.
References
Link Resource
https://bugs.python.org/issue36384 Issue Tracking Patch Vendor Advisory
https://docs.python.org/3/library/ipaddress.html Vendor Advisory
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst Third Party Advisory
https://github.com/python/cpython/pull/12577 Patch Third Party Advisory
https://github.com/python/cpython/pull/25099 Patch Third Party Advisory
https://github.com/sickcodes Third Party Advisory
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md Exploit Third Party Advisory
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html Vendor Advisory
https://security.gentoo.org/glsa/202305-02
https://security.netapp.com/advisory/ntap-20210622-0003/ Third Party Advisory
https://sick.codes/sick-2021-014 Exploit Third Party Advisory
https://www.oracle.com//security-alerts/cpujul2021.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html Patch Third Party Advisory
https://bugs.python.org/issue36384 Issue Tracking Patch Vendor Advisory
https://docs.python.org/3/library/ipaddress.html Vendor Advisory
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst Third Party Advisory
https://github.com/python/cpython/pull/12577 Patch Third Party Advisory
https://github.com/python/cpython/pull/25099 Patch Third Party Advisory
https://github.com/sickcodes Third Party Advisory
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md Exploit Third Party Advisory
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html Vendor Advisory
https://security.gentoo.org/glsa/202305-02
https://security.netapp.com/advisory/ntap-20210622-0003/ Third Party Advisory
https://sick.codes/sick-2021-014 Exploit Third Party Advisory
https://www.oracle.com//security-alerts/cpujul2021.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.1.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

History

21 Nov 2024, 06:01

Type Values Removed Values Added
References () https://bugs.python.org/issue36384 - Issue Tracking, Patch, Vendor Advisory () https://bugs.python.org/issue36384 - Issue Tracking, Patch, Vendor Advisory
References () https://docs.python.org/3/library/ipaddress.html - Vendor Advisory () https://docs.python.org/3/library/ipaddress.html - Vendor Advisory
References () https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst - Third Party Advisory () https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst - Third Party Advisory
References () https://github.com/python/cpython/pull/12577 - Patch, Third Party Advisory () https://github.com/python/cpython/pull/12577 - Patch, Third Party Advisory
References () https://github.com/python/cpython/pull/25099 - Patch, Third Party Advisory () https://github.com/python/cpython/pull/25099 - Patch, Third Party Advisory
References () https://github.com/sickcodes - Third Party Advisory () https://github.com/sickcodes - Third Party Advisory
References () https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md - Exploit, Third Party Advisory () https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md - Exploit, Third Party Advisory
References () https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html - Vendor Advisory () https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html - Vendor Advisory
References () https://security.gentoo.org/glsa/202305-02 - () https://security.gentoo.org/glsa/202305-02 -
References () https://security.netapp.com/advisory/ntap-20210622-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210622-0003/ - Third Party Advisory
References () https://sick.codes/sick-2021-014 - Exploit, Third Party Advisory () https://sick.codes/sick-2021-014 - Exploit, Third Party Advisory
References () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujul2022.html - () https://www.oracle.com/security-alerts/cpujul2022.html -
References () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory

03 May 2023, 11:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202305-02 -

Information

Published : 2021-05-06 13:15

Updated : 2024-11-21 06:01


NVD link : CVE-2021-29921

Mitre link : CVE-2021-29921

CVE.ORG link : CVE-2021-29921


JSON object : View

Products Affected

python

  • python

oracle

  • communications_cloud_native_core_network_slice_selection_function
  • communications_cloud_native_core_binding_support_function
  • communications_cloud_native_core_automated_test_suite
  • graalvm
  • zfs_storage_appliance_kit