Description
In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.
Published: 2019-07-12
Score: 7.8 High
EPSS: 29.5% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1948-1 ruby-mini-magick security update
Debian DSA Debian DSA DSA-4481-1 ruby-mini-magick security update
Github GHSA Github GHSA GHSA-r7j3-vvh2-xrpj OS Command Injection in MiniMagick
History

No history.

Subscriptions

Debian Debian Linux
Minimagick Project Minimagick
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:57:39.417Z

Reserved: 2019-07-11T00:00:00.000Z

Link: CVE-2019-13574

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-12T03:15:10.467

Modified: 2024-11-21T04:25:13.390

Link: CVE-2019-13574

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses