Miggo Logo

CVE-2024-24790:
The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6...

9.8

CVSS Score

Basic Information

EPSS Score
-
CWE
-
Published
6/5/2024
Updated
6/18/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The primary source for identifying the vulnerable functions is the Go vulnerability page https://pkg.go.dev/vuln/GO-2024-2887. This page explicitly lists the affected symbols (methods) within the 'net/netip' package. The vulnerability description states that these 'Is' methods did not correctly handle IPv4-mapped IPv6 addresses. Although the direct patch content from the Gerrit CL (https://go.dev/cl/590316) could not be fetched and analyzed by the available tools, the information from pkg.go.dev is considered authoritative for Go vulnerabilities. The functions listed are methods of the 'Addr' type in the 'net/netip' package. The file path 'src/net/netip/netip.go' is the standard location for this package's source code in the Go repository. The vulnerability lies in these functions returning incorrect boolean values, which could lead to flawed logic in applications relying on these checks for network policy enforcement, security zoning, or other IP address classification tasks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** v*rious Is m*t*o*s (IsPriv*t*, IsLoop***k, *t*) *i* not work *s *xp**t** *or IPv*-m*pp** IPv* ***r*ss*s, r*turnin* **ls* *or ***r*ss*s w*i** woul* r*turn tru* in t**ir tr**ition*l IPv* *orms.

Reasoning

T** prim*ry sour** *or i**nti*yin* t** vuln*r**l* *un*tions is t** *o vuln*r**ility p*** *ttps://pk*.*o.**v/vuln/*O-****-****. T*is p*** *xpli*itly lists t** *****t** sym*ols (m*t*o*s) wit*in t** 'n*t/n*tip' p**k***. T** vuln*r**ility **s*ription st*