Description
Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value. **Note:** An attacker can use this vulnerability to execute commands on the host system.
References (5)
Core 5
Core References
Exploit, Third Party Advisory
https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d
Broken Link
https://github.com/geokit/geokit-rails/blob/master/lib/geokit-rails/ip_geocode_lookup.rb%23L37
Exploit, Patch, Third Party Advisory
https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323
Scores
CVSS v3
8.3
EPSS
0.0027
EPSS Percentile
49.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-78
CWE-502
Status
published
Products (2)
geokit/geokit-rails
< 2.5.0
rubygems/geokit-rails
0 - 2.5.0RubyGems
Published
Oct 06, 2023
Tracked Since
Feb 18, 2026