cve/2023/CVE-2023-26153.md

19 lines
921 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26153](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26153)
![](https://img.shields.io/static/v1?label=Product&message=geokit-rails&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.5.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen)
### Description
2024-06-22 09:37:59 +00:00
Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value. **Note:** An attacker can use this vulnerability to execute commands on the host system.
2024-05-25 21:48:12 +02:00
### POC
#### Reference
- https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d
- https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds