A vulnerability was found in Dalli. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue.
References
- https://nvd.nist.gov/vuln/detail/CVE-2022-4064
- https://github.com/petergoldstein/dalli/issues/932
- https://github.com/petergoldstein/dalli/pull/933
- https://github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d
- https://vuldb.com/?id.214026
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/dalli/CVE-2022-4064.yml
- https://github.com/advisories/GHSA-3xg8-cc8f-9wv2