Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value.

**Note:**

An attacker can use this vulnerability to execute commands on the host system.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 19 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-19T18:33:07.893Z

Reserved: 2023-02-20T10:28:48.930Z

Link: CVE-2023-26153

cve-icon Vulnrichment

Updated: 2024-08-02T11:39:06.704Z

cve-icon NVD

Status : Modified

Published: 2023-10-06T05:15:52.803

Modified: 2024-11-21T07:50:53.453

Link: CVE-2023-26153

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.