RSS   Vulnerabilities for 'Private address check'   RSS

2018-06-13
 
CVE-2018-3759

CWE-362
 

 
private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.

 
2017-11-16
 
CVE-2017-0909

CWE-noinfo
 

 
The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery.

 
2017-11-13
 
CVE-2017-0904

CWE-755
 

 
The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery.

 


Copyright 2024, cxsecurity.com

 

Back to Top