Frequently, a numeric input that begins with "0" is treated as octal, or "0x" causes it to be treated as hexadecimal, e.g. by the inet_addr() function. For example, "023" (octal) is 35 decimal, or "0x31" is 49 decimal. Other bases may be used as well. If the developer assumes decimal-only inputs, the code could produce incorrect numbers when the inputs are parsed using a different base. This can result in unexpected and/or dangerous behavior. For example, a "0127.0.0.1" IP address is parsed as octal due to the leading "0", whose numeric value would be the same as 87.0.0.1 (decimal), where the developer likely expected to use 127.0.0.1.
The consequences vary depending on the surrounding code in which this weakness occurs, but they can include bypassing network-based access control using unexpected IP addresses or netmasks, or causing apparently-symbolic identifiers to be processed as if they are numbers. In web applications, this can enable bypassing of SSRF restrictions.
Scope | Impact | Likelihood |
---|---|---|
Confidentiality | Read Application Data Note: An attacker may use an unexpected numerical base to access private application resources. | Unknown |
Integrity | Bypass Protection Mechanism, Alter Execution Logic Note: An attacker may use an unexpected numerical base to bypass or manipulate access control mechanisms. | Unknown |
References | Description |
---|---|
CVE-2021-29662 | Chain: Use of zero-prepended IP addresses in Perl-based IP validation module can lead to an access control bypass. |
CVE-2021-28918 | Chain: Use of zero-prepended IP addresses in a product that manages IP blocks can lead to an SSRF. |
CVE-2021-29921 | Chain: Use of zero-prepended IP addresses in a Python standard library package can lead to an SSRF. |
CVE-2021-29923 | Chain: Use of zero-prepended IP addresses in the net Golang library can lead to an access control bypass. |
CVE-2021-29424 | Chain: Use of zero-prepended IP addresses in Perl netmask module allows bypass of IP-based access control. |
CVE-2016-4029 | Chain: incorrect validation of intended decimal-based IP address format (CWE-1286) enables parsing of octal or hexadecimal formats (CWE-1389), allowing bypass of an SSRF protection mechanism (CWE-918). |
CVE-2020-13776 | Mishandling of hex-valued usernames leads to unexpected decimal conversion and privilege escalation in the systemd Linux suite. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
Anonymous External Contributor | 4.9 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated Relationships, Time_of_Introduction | |
CWE Content Team | MITRE | updated Mapping_Notes |