{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-4064","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","dateUpdated":"2025-04-15T13:12:29.327Z","dateReserved":"2022-11-19T00:00:00.000Z","datePublished":"2022-11-19T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-28T05:29:58.623Z"},"title":"Dalli Meta Protocol request_formatter.rb self.meta_set injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-707","lang":"en","description":"Improper Neutralization"}]}],"affected":[{"vendor":"n/a","product":"Dalli","versions":[{"version":"3.2.0","status":"affected"},{"version":"3.2.1","status":"affected"},{"version":"3.2.2","status":"affected"}],"modules":["Meta Protocol Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Dalli up to 3.2.2. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation of the argument cas/ttl leads to injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.3 is able to address this issue. The patch is identified as 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to upgrade the affected component."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in Dalli bis 3.2.2 ausgemacht. Hiervon betroffen ist die Funktion self.meta_set der Datei lib/dalli/protocol/meta/request_formatter.rb der Komponente Meta Protocol Handler. Durch Beeinflussen des Arguments cas/ttl mit unbekannten Daten kann eine injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 3.2.3 vermag dieses Problem zu lösen. Der Patch wird als 48d594dae55934476fec61789e7a7c3700e0f50d bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N"}}],"timeline":[{"time":"2022-11-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2022-11-19T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2022-11-19T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-28T06:34:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.214026","name":"VDB-214026 | Dalli Meta Protocol request_formatter.rb self.meta_set injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.214026","name":"VDB-214026 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://github.com/petergoldstein/dalli/issues/932","tags":["exploit","issue-tracking"]},{"url":"https://github.com/petergoldstein/dalli/pull/933","tags":["issue-tracking"]},{"url":"https://github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d","tags":["patch"]},{"url":"https://github.com/petergoldstein/dalli/releases/tag/v3.2.3","tags":["patch"]},{"url":"https://github.com/advisories/GHSA-3xg8-cc8f-9wv2","tags":["issue-tracking"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:27:54.189Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/petergoldstein/dalli/issues/932","tags":["x_transferred"]},{"url":"https://github.com/petergoldstein/dalli/pull/933","tags":["x_transferred"]},{"url":"https://github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d","tags":["x_transferred"]},{"url":"https://vuldb.com/?id.214026","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T16:57:06.321284Z","id":"CVE-2022-4064","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T13:12:29.327Z"}}]}}