Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201309011625.r81GPHqN007324@linus.mitre.org>
Date: Sun, 1 Sep 2013 12:25:17 -0400 (EDT)
From: cve-assign@...re.org
To: larry0@...com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Remote Command Injection in fog-dragonfly-0.8.2 Ruby Gem

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>Remote Command Injection in fog-dragonfly-0.8.2 Ruby Gem
>Download: https://rubygems.org/gems/fog-dragonfly
>
>"Dragonfly is an on-the-fly Rack-based image handling framework. It is
>suitable for use with Rails, Sinatra and other web frameworks.
>
>Unescaped user supplied input is passed to the command line for shell
>execution
>
>fog-dragonfly-0.8.2/lib/dragonfly/imagemagickutils.rb:
>
> 20     def convert(tempobject, args='', format=nil)
> 21       tempfile = newtempfile(format)
> 22       run "#{convertcommand} #{args} #{tempobject.path} #{tempfile.path}"
> 23       tempfile
> 24     end
>
>
> 61     def run(command)
> 62       log.debug("Running command: #{command}") if ImageMagickUtils.log_commands
> 63       begin
> 64         result = #{command}

Use CVE-2013-5671 for this vulnerability in the fog-dragonfly gem. As
far as we can tell, this is a vulnerability in the fog-dragonfly gem,
not a vulnerability in Dragonfly. We found these possibly related
fixes in Dragonfly:

  https://github.com/markevans/dragonfly/commit/ff141bb1d921fff506084b62a562f7a83d5e01fe#lib/dragonfly/image_magick/utils.rb

  https://github.com/markevans/dragonfly/commit/47f95bd6b8af11fb0a44d6ab1c6f7d00d880cb68

If the unpatched Dragonfly code has a vulnerability in a common use
case, this would require a separate CVE ID.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJSI2XoAAoJEGvefgSNfHMdv0oH/j0G7m0PMSwn1FvIcVpR39EP
yKTuTfa9I5MSr2DXejQQ+5lhJN7eTJwjOTPETpGOu0BkDgMkRvcuw81PqgVwkWXc
bT8DfNM/cO4vM3UjTJiTKYinVRMl3xsjGVzkwxV0E1mYhjbjrKGNUMgzjNPsSnja
eNYC26v2UDLn3Jw8K7qXTk+ytgFqOE+MiA/KDXBvm6fB1SBOoeeaMGU7NNdCw8A9
95TdYNzYE3JL7V0zz/5oidqkg0hlznK21KR01hUJK0s/U60rdzgA/73O+g8XSP4q
vyqN0ykgSDodfAt6JsONR/5wzaXTmc25ZXaB3wMGG9yUxFZiORzVGSsWJ7mlad0=
=SUlN
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.