Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-21831

Опубликовано: 08 мар. 2022
Источник: redhat
CVSS3: 9.8

Описание

A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments.

A flaw was found in the Active Storage module of Rails, where the transformation method or its arguments for image_processing are not trusted arbitrary input. This flaw allows an attacker to inject code in Rails.

Меры по смягчению последствий

To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally, a strict image magick security policy will help mitigate this issue: https://imagemagick.org/script/security-policy.php

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Satellite 6tfm-ror52-rubygem-railsNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2064747rubygem-activestorage: Code injection vulnerability in ActiveStorage

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 3 лет назад

A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments.

CVSS3: 9.8
nvd
больше 3 лет назад

A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments.

CVSS3: 9.8
debian
больше 3 лет назад

A code injection vulnerability exists in the Active Storage >= v5.2.0 ...

CVSS3: 9.8
github
почти 4 года назад

Possible code injection vulnerability in Rails / Active Storage

CVSS3: 9.8
fstec
почти 4 года назад

Уязвимость модуля Active Storage программной платформы Ruby on Rails, позволяющая нарушителю выполнить произвольный код

9.8 Critical

CVSS3