Arbitrary Command Execution Affecting dragonfly package, versions < 1.0.7
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-DRAGONFLY-20193
- published 24 Aug 2014
- disclosed 24 Aug 2014
- credit Unknown
Overview
dragonfly
is a framework that enables on-the-fly processing for any content type. This gem was renamed from fog-dragonfly
to dragonfly
.
Affected versions of this gem are vulnerable to a remote attacker gaining read/write access to the filesystem, and executing arbitrary commands via a flaw in uploading & processing. This is that is due to the gem failing to restrict arbitrary commands to imagemagicks convert.
Related to SNYK-RUBY-DRAGONFLY-20192
References
CVSS Scores
version 3.1