Vulnerability Details : CVE-2022-4064
A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability.
Products affected by CVE-2022-4064
- cpe:2.3:a:dalli_project:dalli:*:*:*:*:*:ruby:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-4064
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 45 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-4064
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.1
|
LOW | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
1.6
|
1.4
|
VulDB | |
3.7
|
LOW | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
2.2
|
1.4
|
NIST |
CWE ids for CVE-2022-4064
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by:
- cna@vuldb.com (Secondary)
- nvd@nist.gov (Primary)
-
The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain security properties are met before being read from an upstream component or sent to a downstream component.Assigned by: cna@vuldb.com (Secondary)
References for CVE-2022-4064
-
https://github.com/petergoldstein/dalli/pull/933
Fixes #932 by petergoldstein · Pull Request #933 · petergoldstein/dalli · GitHubPatch;Third Party Advisory
-
https://vuldb.com/?id.214026
CVE-2022-4064 | Dalli Meta Protocol request_formatter.rb self.meta_set injectionThird Party Advisory
-
https://github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d
Fixes #932 (#933) · petergoldstein/dalli@48d594d · GitHubPatch;Third Party Advisory
-
https://github.com/petergoldstein/dalli/issues/932
Meta protocol flush_all method is vulnerable to code injection (Lack of input type check) · Issue #932 · petergoldstein/dalli · GitHubExploit;Issue Tracking;Third Party Advisory
Jump to