IPv4-mapped IPv6 addresses did not get recognized as "local" by the code and a connection attempt is made. Attackers with access to user accounts could use this to bypass existing deny-list functionality and trigger requests to restricted network infrastructure to gain insight about topology and running services. We now respect possible IPV4-mapped IPv6 addresses when checking if contained in a deny-list. No publicly available exploits are known.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-30251 IPv4-mapped IPv6 addresses did not get recognized as "local" by the code and a connection attempt is made. Attackers with access to user accounts could use this to bypass existing deny-list functionality and trigger requests to restricted network infrastructure to gain insight about topology and running services. We now respect possible IPV4-mapped IPv6 addresses when checking if contained in a deny-list. No publicly available exploits are known.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2024-08-02T11:46:24.651Z

Reserved: 2023-02-22T20:42:56.089Z

Link: CVE-2023-26431

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-06-20T08:15:09.297

Modified: 2024-11-21T07:51:25.743

Link: CVE-2023-26431

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses