Description
In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1948-1 | ruby-mini-magick security update |
Debian DSA |
DSA-4481-1 | ruby-mini-magick security update |
Github GHSA |
GHSA-r7j3-vvh2-xrpj | OS Command Injection in MiniMagick |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:57:39.417Z
Reserved: 2019-07-11T00:00:00.000Z
Link: CVE-2019-13574
No data.
Status : Modified
Published: 2019-07-12T03:15:10.467
Modified: 2024-11-21T04:25:13.390
Link: CVE-2019-13574
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Github GHSA