CVE-2022-4064: Unsanitized input leading to code injection in Dalli
3.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50356%
CWE
Published
11/19/2022
Updated
1/29/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dalli | rubygems | < 3.2.3 | 3.2.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from multiple functions in the meta protocol handler that directly interpolated user-controlled parameters (CAS, TTL, delay) into Memcached protocol commands without proper sanitization. The commit 48d594d specifically adds input validation through parse_to_64_bit_int and cas_string methods, addressing injection vectors in these functions. The GHSA advisory and CWE-74 classification confirm the injection vulnerability pattern through unneutralized special elements in downstream commands.