Skip to content

Unsanitized input leading to code injection in Dalli

Low severity GitHub Reviewed Published Nov 19, 2022 to the GitHub Advisory Database • Updated Jan 29, 2023

Package

bundler dalli (RubyGems)

Affected versions

< 3.2.3

Patched versions

3.2.3

Description

A vulnerability was found in Dalli. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue.

References

Published by the National Vulnerability Database Nov 19, 2022
Published to the GitHub Advisory Database Nov 19, 2022
Reviewed Nov 21, 2022
Last updated Jan 29, 2023

Severity

Low
3.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Weaknesses

CVE ID

CVE-2022-4064

GHSA ID

GHSA-3xg8-cc8f-9wv2

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.