Home / exploitsPDF  

Fog-dragonfly-0.8.2 Ruby Gem Remote Command Injection

Posted on 01 September 2013

<pre>TITLE: Remote Command Injection in fog-dragonfly-0.8.2 Ruby Gem Credit: Larry W. Cashdollar, @_larry0 Date: 8/16/2013 CVE: TBD Download: https://rubygems.org/gems/fog-dragonfly Description: &quot;Dragonfly is an on-the-fly Rack-based image handling framework. It is suitable for use with Rails, Sinatra and other web frameworks. Although it's mainly used for images, it can handle any content type.&quot; Unescaped user supplied input is passed to the command line for shell execution: from fog-dragonfly-0.8.2/lib/dragonfly/imagemagickutils.rb: 20 def convert(tempobject, args='', format=nil) 21 tempfile = newtempfile(format) 22 run &quot;#{convertcommand} #{args} #{tempobject.path} #{tempfile.path}&quot; 23 tempfile 24 end . . . 61 def run(command) 62 log.debug(&quot;Running command: #{command}&quot;) if ImageMagickUtils.log_commands 63 begin 64 result = #{command} Vendor Notified: 8/16/2013 </pre>

 

TOP