GHSA-3xg8-cc8f-9wv2

Suggest an improvement
Source
https://github.com/advisories/GHSA-3xg8-cc8f-9wv2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-3xg8-cc8f-9wv2/GHSA-3xg8-cc8f-9wv2.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-3xg8-cc8f-9wv2
Aliases
Published
2022-11-19T21:30:26Z
Modified
2023-11-01T04:59:55.279746Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Unsanitized input leading to code injection in Dalli
Details

A vulnerability was found in Dalli. Affected is the function self.metaset of the file lib/dalli/protocol/meta/requestformatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue.

Database specific
{
    "nvd_published_at": "2022-11-19T19:15:00Z",
    "github_reviewed_at": "2022-11-21T23:54:20Z",
    "severity": "LOW",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-74"
    ]
}
References

Affected packages

RubyGems / dalli

Package

Name
dalli
Purl
pkg:gem/dalli

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.3

Affected versions

0.*

0.9.0
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6
0.9.7
0.9.8
0.9.9
0.9.10
0.10.0
0.10.1
0.11.0
0.11.1
0.11.2

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.1.0
2.2.0
2.2.1
2.3.0
2.5.0
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.7.0
2.7.1
2.7.2
2.7.3
2.7.4
2.7.5
2.7.6
2.7.7
2.7.8
2.7.9
2.7.10
2.7.11

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.2.0
3.2.1
3.2.2