-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dalli | rubygems | < 3.2.3 | 3.2.3 |
The vulnerability stemmed from multiple functions in the meta protocol handler that directly interpolated user-controlled parameters (CAS, TTL, delay) into Memcached protocol commands without proper sanitization. The commit 48d594d specifically adds input validation through parse_to_64_bit_int and cas_string methods, addressing injection vectors in these functions. The GHSA advisory and CWE-74 classification confirm the injection vulnerability pattern through unneutralized special elements in downstream commands.
Ongoing coverage of React2Shell