Описание
Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value.
Note:
An attacker can use this vulnerability to execute commands on the host system.
Ссылки
- ExploitThird Party Advisory
- Broken Link
- Patch
- Patch
- ExploitPatchThird Party Advisory
- ExploitThird Party Advisory
- Broken Link
- Patch
- Patch
- ExploitPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.5.0 (исключая)
cpe:2.3:a:geokit:geokit-rails:*:*:*:*:*:rails:*:*
EPSS
Процентиль: 50%
0.00265
Низкий
8.3 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-78
CWE-502
Связанные уязвимости
EPSS
Процентиль: 50%
0.00265
Низкий
8.3 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-78
CWE-502