logo

CVE-2022-4064 dalli

Package

Manager: gem
Name: dalli
Vulnerable Version: >=0 <3.2.3

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00271 pctl0.50297

Details

Unsanitized input leading to code injection in Dalli A vulnerability was found in Dalli. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue.

Metadata

Created: 2022-11-19T21:30:26Z
Modified: 2022-11-26T20:22:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-3xg8-cc8f-9wv2/GHSA-3xg8-cc8f-9wv2.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-3xg8-cc8f-9wv2
Finding: F184
Auto approve: 1