CVE-2022-4064

A vulnerability was found in Dalli up to 3.2.2. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation of the argument cas/ttl leads to injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.3 is able to address this issue. The patch is identified as 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dalli_project:dalli:*:*:*:*:*:ruby:*:*

History

28 Mar 2025, 06:15

Type Values Removed Values Added
Summary (en) A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability. (en) A vulnerability was found in Dalli up to 3.2.2. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation of the argument cas/ttl leads to injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.3 is able to address this issue. The patch is identified as 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to upgrade the affected component.
References
  • () https://github.com/advisories/GHSA-3xg8-cc8f-9wv2 -
  • () https://github.com/petergoldstein/dalli/releases/tag/v3.2.3 -
  • () https://vuldb.com/?ctiid.214026 -
CVSS v2 : unknown
v3 : 3.1
v2 : 2.6
v3 : 3.7

21 Nov 2024, 07:34

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 3.7
v2 : unknown
v3 : 3.1
References () https://github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d - Patch, Third Party Advisory () https://github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d - Patch, Third Party Advisory
References () https://github.com/petergoldstein/dalli/issues/932 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/petergoldstein/dalli/issues/932 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/petergoldstein/dalli/pull/933 - Patch, Third Party Advisory () https://github.com/petergoldstein/dalli/pull/933 - Patch, Third Party Advisory
References () https://vuldb.com/?id.214026 - Third Party Advisory () https://vuldb.com/?id.214026 - Third Party Advisory

26 Nov 2022, 03:22

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-19 19:15

Updated : 2025-03-28 06:15


NVD link : CVE-2022-4064

Mitre link : CVE-2022-4064

CVE.ORG link : CVE-2022-4064


JSON object : View

Products Affected

dalli_project

  • dalli
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-707

Improper Neutralization