Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. dalli
  4. ›
  5. CVE-2022-4064

CVE-2022-4064: Unsanitized input leading to code injection in Dalli

November 19, 2022 (updated November 7, 2023)

A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability.

References

  • github.com/advisories/GHSA-3xg8-cc8f-9wv2
  • github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d
  • github.com/petergoldstein/dalli/issues/932
  • github.com/petergoldstein/dalli/pull/933
  • nvd.nist.gov/vuln/detail/CVE-2022-4064
  • vuldb.com/?id.214026

Code Behaviors & Features

Detect and mitigate CVE-2022-4064 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from - before 3.2.3

Fixed versions

  • 3.2.3

Solution

Upgrade to version 3.2.3 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Source file

gem/dalli/CVE-2022-4064.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:01 +0000.