Описание
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
Ссылки
- PatchThird Party Advisory
- PatchThird Party Advisory
- Issue TrackingThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Issue TrackingThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.4.0 (исключая)
cpe:2.3:a:dragonfly_project:dragonfly:*:*:*:*:*:ruby:*:*
EPSS
Процентиль: 100%
0.93359
Критический
9.8 Critical
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-88
Связанные уязвимости
CVSS3: 9.8
github
больше 4 лет назад
Dragonfly contains remote code execution vulnerability
EPSS
Процентиль: 100%
0.93359
Критический
9.8 Critical
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-88