CVE Vulnerabilities

CVE-2022-4064

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Nov 19, 2022 | Modified: Nov 07, 2023
CVSS 3.x
3.7
LOW
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
LOW

A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Dalli Dalli_project - (including) 3.2.3 (excluding)
Ruby-dalli Ubuntu bionic *
Ruby-dalli Ubuntu kinetic *
Ruby-dalli Ubuntu lunar *
Ruby-dalli Ubuntu mantic *
Ruby-dalli Ubuntu trusty *
Ruby-dalli Ubuntu xenial *

Potential Mitigations

References