Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1327:Binding to an Unrestricted IP Address
Weakness ID:1327
Version:v4.17
Weakness Name:Binding to an Unrestricted IP Address
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product assigns the address 0.0.0.0 for a database server, a cloud service/instance, or any computing resource that communicates remotely.

▼Extended Description

When a server binds to the address 0.0.0.0, it allows connections from every IP address on the local machine, effectively exposing the server to every possible network. This might be much broader access than intended by the developer or administrator, who might only be expecting the server to be reachable from a single interface/network.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfDiscouragedC668Exposure of Resource to Wrong Sphere
Nature: ChildOf
Mapping: Discouraged
Type: Class
ID: 668
Name: Exposure of Resource to Wrong Sphere
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC417Communication Channel Errors
MemberOfProhibitedC1403Comprehensive Categorization: Exposed Resource
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 417
Name: Communication Channel Errors
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1403
Name: Comprehensive Categorization: Exposed Resource
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-251Weaknesses in Software Written in Other
MemberOfProhibitedBSBOSS-270Weaknesses in Web Server
MemberOfProhibitedBSBOSS-285Firewall Strategy
MemberOfProhibitedBSBOSS-298Not OS-Specific(os class) Weaknesses
MemberOfProhibitedBSBOSS-301Not Architecture-Specific (architecture class) Weaknesses
MemberOfProhibitedBSBOSS-303Client Server (technology class) Weaknesses
MemberOfProhibitedBSBOSS-304Cloud Computing (technology class) Weaknesses
MemberOfProhibitedBSBOSS-321DoS: Amplification (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-251
Name: Weaknesses in Software Written in Other
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-270
Name: Weaknesses in Web Server
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-285
Name: Firewall Strategy
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-298
Name: Not OS-Specific(os class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-301
Name: Not Architecture-Specific (architecture class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-303
Name: Client Server (technology class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-304
Name: Cloud Computing (technology class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-321
Name: DoS: Amplification (impact)
▼Relevant To View
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC417Communication Channel Errors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 417
Name: Communication Channel Errors
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
AvailabilityHighDoS: Amplification
N/A
Scope: Availability
Likelihood: High
Impact: DoS: Amplification
Note:
N/A
▼Potential Mitigations
Phase:System Configuration
Mitigation ID:
Strategy:
Effectiveness: High
Description:

Assign IP addresses that are not 0.0.0.0.

Note:


Phase:System Configuration
Mitigation ID:
Strategy: Firewall
Effectiveness: High
Description:

Unwanted connections to the configured server may be denied through a firewall or other packet filtering measures.

Note:

▼Modes Of Introduction
Phase: System Configuration
Note:

N/A

▼Applicable Platforms
Languages
Class: Other(Undetermined Prevalence)
Technology
Class: Web Server(Undetermined Prevalence)
Class: Client Server(Undetermined Prevalence)
Class: Cloud Computing(Undetermined Prevalence)
Operating System
Class: Not OS-Specific(Undetermined Prevalence)
Architecture
Class: Not Architecture-Specific(Undetermined Prevalence)
▼Demonstrative Examples
Example 1

The following code snippet uses 0.0.0.0 in a Puppet script.

Language: ( code)
N/A

Language: Other(Bad code)
signingserver::instance { "nightly-key-signing-server": listenaddr => "0.0.0.0", port => "9100", code_tag => "SIGNING_SERVER", }

Language: ( code)
N/A

The Puppet code snippet is used to provision a signing server that will use 0.0.0.0 to accept traffic. However, as 0.0.0.0 is unrestricted, malicious users may use this IP address to launch frequent requests and cause denial of service attacks.

Language: Other(Good code)
signingserver::instance { "nightly-key-signing-server": listenaddr => "127.0.0.1", port => "9100", code_tag => "SIGNING_SERVER", }

▼Observed Examples
ReferenceDescription
CVE-2022-21947
Desktop manager for Kubernetes and container management binds a service to 0.0.0.0, allowing users on the network to make requests to a dashboard API.
Reference: CVE-2022-21947
Description:
Desktop manager for Kubernetes and container management binds a service to 0.0.0.0, allowing users on the network to make requests to a dashboard API.
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ▼Related Attack Patterns
      IDName
      CAPEC-1
      Accessing Functionality Not Properly Constrained by ACLs
      ID: CAPEC-1
      Name: Accessing Functionality Not Properly Constrained by ACLs
      ▼References
      Reference ID: REF-1158
      Title: Security Smells in Ansible and Chef Scripts: A Replication Study
      Author: Akond Rahman, Md Rayhanur Rahman, Chris Parnin, Laurie Williams
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://arxiv.org/pdf/1907.07159.pdf
      URL Date:
      Day:20
      Month:06
      Year:2020
      Reference ID: REF-1159
      Title: The Seven Sins: Security Smells in Infrastructure as Code Scripts
      Author: Akond Rahman, Chris Parnin, Laurie Williams
      Section:
      Publication:
      ICSE '19: Proceedings of the 41st International Conference on Software Engineering
      Publisher:
      Edition:
      URL:https://dl.acm.org/doi/10.1109/ICSE.2019.00033
      URL Date:2023-04-07
      Day:N/A
      Month:05
      Year:2019
      Details not found