Miggo Logo

CVE-2022-4064: Unsanitized input leading to code injection in Dalli

3.7

CVSS Score
3.1

Basic Information

EPSS Score
0.50356%
Published
11/19/2022
Updated
1/29/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
dallirubygems< 3.2.33.2.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from multiple functions in the meta protocol handler that directly interpolated user-controlled parameters (CAS, TTL, delay) into Memcached protocol commands without proper sanitization. The commit 48d594d specifically adds input validation through parse_to_64_bit_int and cas_string methods, addressing injection vectors in these functions. The GHSA advisory and CWE-74 classification confirm the injection vulnerability pattern through unneutralized special elements in downstream commands.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility w*s *oun* in **lli. *****t** is t** *un*tion s*l*.m*t*_s*t o* t** *il* li*/**lli/proto*ol/m*t*/r*qu*st_*orm*tt*r.r* o* t** *ompon*nt M*t* Proto*ol **n*l*r. T** m*nipul*tion l***s to inj**tion. T** *xploit **s ***n *is*los** to t** pu*

Reasoning

T** vuln*r**ility st*mm** *rom multipl* *un*tions in t** m*t* proto*ol **n*l*r t**t *ir**tly int*rpol*t** us*r-*ontroll** p*r*m*t*rs (**S, TTL, **l*y) into M*m****** proto*ol *omm*n*s wit*out prop*r s*nitiz*tion. T** *ommit ******* sp**i*i**lly ***s