CVE-2023-26153

Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value. **Note:** An attacker can use this vulnerability to execute commands on the host system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:geokit:geokit-rails:*:*:*:*:*:rails:*:*

History

21 Nov 2024, 07:50

Type Values Removed Values Added
References () https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d - Exploit, Third Party Advisory () https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d - Exploit, Third Party Advisory
References () https://github.com/geokit/geokit-rails/blob/master/lib/geokit-rails/ip_geocode_lookup.rb%23L37 - Broken Link () https://github.com/geokit/geokit-rails/blob/master/lib/geokit-rails/ip_geocode_lookup.rb%23L37 - Broken Link
References () https://github.com/geokit/geokit-rails/commit/7ffc5813e57f6f417987043e1039925fd0865c43 - Patch () https://github.com/geokit/geokit-rails/commit/7ffc5813e57f6f417987043e1039925fd0865c43 - Patch
References () https://github.com/geokit/geokit-rails/commit/a93dfe49fb9aeae7164e2f8c4041450a04b5482f - Patch () https://github.com/geokit/geokit-rails/commit/a93dfe49fb9aeae7164e2f8c4041450a04b5482f - Patch
References () https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323 - Exploit, Patch, Third Party Advisory () https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323 - Exploit, Patch, Third Party Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.3

13 Oct 2023, 18:04

Type Values Removed Values Added
References (MISC) https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323 - (MISC) https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323 - Exploit, Patch, Third Party Advisory
References (MISC) https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d - (MISC) https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d - Exploit, Third Party Advisory
References (MISC) https://github.com/geokit/geokit-rails/commit/a93dfe49fb9aeae7164e2f8c4041450a04b5482f - (MISC) https://github.com/geokit/geokit-rails/commit/a93dfe49fb9aeae7164e2f8c4041450a04b5482f - Patch
References (MISC) https://github.com/geokit/geokit-rails/blob/master/lib/geokit-rails/ip_geocode_lookup.rb%23L37 - (MISC) https://github.com/geokit/geokit-rails/blob/master/lib/geokit-rails/ip_geocode_lookup.rb%23L37 - Broken Link
References (MISC) https://github.com/geokit/geokit-rails/commit/7ffc5813e57f6f417987043e1039925fd0865c43 - (MISC) https://github.com/geokit/geokit-rails/commit/7ffc5813e57f6f417987043e1039925fd0865c43 - Patch
CPE cpe:2.3:a:geokit:geokit-rails:*:*:*:*:*:rails:*:*
CWE CWE-502
First Time Geokit geokit-rails
Geokit
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

06 Oct 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-06 05:15

Updated : 2024-11-21 07:50


NVD link : CVE-2023-26153

Mitre link : CVE-2023-26153

CVE.ORG link : CVE-2023-26153


JSON object : View

Products Affected

geokit

  • geokit-rails
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-502

Deserialization of Untrusted Data