First published: Tue Apr 05 2022(Updated: )
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Mruby Mruby | <=3.0.0 | |
Mruby Mruby | =3.1.0-rc | |
Mruby Mruby | =3.1.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-1212.
CVE-2022-1212 has a severity rating of 9.8 (critical).
CVE-2022-1212 affects mruby/mruby versions prior to 3.2.
Yes, arbitrary code execution is possible if CVE-2022-1212 is exploited.
To fix CVE-2022-1212, update mruby/mruby to version 3.2 or above.