An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://github.com/markevans/dragonfly/issues/513 | issue tracking third party advisory |
https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5 | third party advisory patch |
https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0 | third party advisory patch |
https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml | third party advisory exploit |
https://github.com/mlr0p/CVE-2021-33564 | third party advisory exploit |
https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/ | third party advisory exploit |