A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d | Patch Third Party Advisory |
https://github.com/petergoldstein/dalli/issues/932 | Exploit Issue Tracking Third Party Advisory |
https://github.com/petergoldstein/dalli/pull/933 | Patch Third Party Advisory |
https://vuldb.com/?id.214026 | Third Party Advisory |
Configurations
Information
Published : 2022-11-19 11:15
Updated : 2022-11-25 19:22
NVD link : CVE-2022-4064
Mitre link : CVE-2022-4064
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
dalli_project
- dalli