CVE-2022-4064 – dalli
Package
Manager: gem
Name: dalli
Vulnerable Version: >=0 <3.2.3
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00271 pctl0.50297
Details
Unsanitized input leading to code injection in Dalli A vulnerability was found in Dalli. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue.
Metadata
Created: 2022-11-19T21:30:26Z
Modified: 2022-11-26T20:22:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-3xg8-cc8f-9wv2/GHSA-3xg8-cc8f-9wv2.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-3xg8-cc8f-9wv2
Finding: F184
Auto approve: 1