Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3xg8-cc8f-9wv2

Опубликовано: 19 нояб. 2022
Источник: github
Github: Прошло ревью
CVSS3: 3.7

Описание

Unsanitized input leading to code injection in Dalli

A vulnerability was found in Dalli. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue.

Пакеты

Наименование

dalli

rubygems
Затронутые версииВерсия исправления

< 3.2.3

3.2.3

EPSS

Процентиль: 54%
0.00311
Низкий

3.7 Low

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 3 лет назад

A vulnerability was found in Dalli up to 3.2.2. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation of the argument cas/ttl leads to injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.3 is able to address this issue. The patch is identified as 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to upgrade the affected component.

CVSS3: 3.7
nvd
около 3 лет назад

A vulnerability was found in Dalli up to 3.2.2. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation of the argument cas/ttl leads to injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.3 is able to address this issue. The patch is identified as 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to upgrade the affected component.

CVSS3: 3.7
debian
около 3 лет назад

A vulnerability was found in Dalli up to 3.2.2. It has been classified ...

EPSS

Процентиль: 54%
0.00311
Низкий

3.7 Low

CVSS3

Дефекты

CWE-74