geokit-rails Command Injection vulnerability
Critical severity
GitHub Reviewed
Published
Oct 6, 2023
to the GitHub Advisory Database
•
Updated Nov 8, 2023
Description
Published by the National Vulnerability Database
Oct 6, 2023
Published to the GitHub Advisory Database
Oct 6, 2023
Reviewed
Oct 6, 2023
Last updated
Nov 8, 2023
Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value.
Note:
An attacker can use this vulnerability to execute commands on the host system.
References