From e3228cced38a94c837cac0a1ee9daa6f859f77ef Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Wed, 18 May 2022 13:16:17 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-33564.yaml by mp --- cves/2021/CVE-2021-33564.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-33564.yaml b/cves/2021/CVE-2021-33564.yaml index e99d537b51..f8c09008f5 100644 --- a/cves/2021/CVE-2021-33564.yaml +++ b/cves/2021/CVE-2021-33564.yaml @@ -1,15 +1,16 @@ id: CVE-2021-33564 info: - name: Argument Injection in Ruby Dragonfly + name: Ruby Dragonfly <1.4.0 - Remote Code Execution author: 0xsapra severity: critical - description: An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility. + description: Ruby Dragonfly before 1.4.0 contains an argument injection vulnerability that allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility. reference: - https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/ - https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0 - https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5 - https://github.com/mlr0p/CVE-2021-33564 + - https://nvd.nist.gov/vuln/detail/CVE-2021-33564 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 @@ -31,3 +32,5 @@ requests: - type: regex regex: - "root:.*:0:0:" + +# Enhanced by mp on 2022/05/18