Vulnerability Description
Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value. **Note:** An attacker can use this vulnerability to execute commands on the host system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Geokit | Geokit-Rails | < 2.5.0 |
Related Weaknesses (CWE)
References
- https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901dExploitThird Party Advisory
- https://github.com/geokit/geokit-rails/blob/master/lib/geokit-rails/ip_geocode_lBroken Link
- https://github.com/geokit/geokit-rails/commit/7ffc5813e57f6f417987043e1039925fd0Patch
- https://github.com/geokit/geokit-rails/commit/a93dfe49fb9aeae7164e2f8c4041450a04Patch
- https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323ExploitPatchThird Party Advisory
- https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901dExploitThird Party Advisory
- https://github.com/geokit/geokit-rails/blob/master/lib/geokit-rails/ip_geocode_lBroken Link
- https://github.com/geokit/geokit-rails/commit/7ffc5813e57f6f417987043e1039925fd0Patch
- https://github.com/geokit/geokit-rails/commit/a93dfe49fb9aeae7164e2f8c4041450a04Patch
- https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323ExploitPatchThird Party Advisory
FAQ
What is CVE-2023-26153?
CVE-2023-26153 is a vulnerability with a CVSS score of 8.3 (HIGH). Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a...
How severe is CVE-2023-26153?
CVE-2023-26153 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-26153?
Check the references section above for vendor advisories and patch information. Affected products include: Geokit Geokit-Rails.