IP Address Parsing Vulnerability in Rust Programming Language
CVE-2021-29922
9.1CRITICAL
Summary
An issue in the Rust programming language prior to version 1.53.0 arises from improper handling of leading zero characters in IP address strings. This flaw can lead to unexpected octal interpretation of IP addresses, potentially allowing attackers to bypass security mechanisms that depend on IP-based access control. Proper validation is essential to ensure that input is interpreted as intended and does not expose systems to unauthorized access.
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved