ipaddress@1.0.14 vulnerabilities

IPv4/IPv6 manipulation library

Direct Vulnerabilities

Known vulnerabilities in the ipaddress package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Input Validation

ipaddress is an IPv4/IPv6 manipulation library

Affected versions of this package are vulnerable to Improper Input Validation. Improper input validation of octal strings in stdlib ipaddress allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. The highest threat from this vulnerability is to data integrity and system availability.

How to fix Improper Input Validation?

There is no fixed version for ipaddress.

[0,)
  • M
Hash Collision

ipaddress is an IPv4/IPv6 manipulation library

Affected versions of this package are vulnerable to Hash Collision. The package improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created.

How to fix Hash Collision?

There is no fixed version for ipaddress.

[0,)
  • M
Cryptographic Issues

ipaddress is an IPv4/IPv6 manipulation library

Affected versions of this package are vulnerable to Cryptographic Issues. The hash() methods of classes IPv4Interface and IPv6Interface had issue of generating constant hash values of 32 and 128 respectively causing hash collisions. The fix uses the hash() function to generate hash values for the objects instead of XOR operation.

How to fix Cryptographic Issues?

There is no fixed version for ipaddress.

[0,)