CVE-2022-24720 Affecting ruby-image-processing package, versions <1.10.3-1ubuntu0.22.04.1


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.49% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2204-RUBYIMAGEPROCESSING-2775264
  • published5 Mar 2024
  • disclosed1 Mar 2022

Introduced: 1 Mar 2022

CVE-2022-24720  (opens in a new tab)

How to fix?

Upgrade Ubuntu:22.04 ruby-image-processing to version 1.10.3-1ubuntu0.22.04.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ruby-image-processing package and not the ruby-image-processing package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

image_processing is an image processing wrapper for libvips and ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the #apply method from image_processing to apply a series of operations that are coming from unsanitized user input allows the attacker to execute shell commands. This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. The vulnerability has been fixed in version 1.12.2 of image_processing. As a workaround, users who process based on user input should always sanitize the user input by allowing only a constrained set of operations.

CVSS Scores

version 3.1