Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 01 Sep 2013 13:44:31 -0400
From: Larry Cashdollar <larry0@...com>
To: cve-assign@...re.org
Cc: oss-security@...ts.openwall.com
Subject: Re: Remote Command Injection in fog-dragonfly-0.8.2 Ruby Gem

Yes sorry this is for the gem only.


Sent with AquaMail for Android
http://www.aqua-mail.com


On September 1, 2013 12:25:17 PM cve-assign@...re.org wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> >Remote Command Injection in fog-dragonfly-0.8.2 Ruby Gem
> >Download: https://rubygems.org/gems/fog-dragonfly
> >
> >"Dragonfly is an on-the-fly Rack-based image handling framework. It is
> >suitable for use with Rails, Sinatra and other web frameworks.
> >
> >Unescaped user supplied input is passed to the command line for shell
> >execution
> >
> >fog-dragonfly-0.8.2/lib/dragonfly/imagemagickutils.rb:
> >
> > 20     def convert(tempobject, args='', format=nil)
> > 21       tempfile = newtempfile(format)
> > 22       run "#{convertcommand} #{args} #{tempobject.path} #{tempfile.path}"
> > 23       tempfile
> > 24     end
> >
> >
> > 61     def run(command)
> > 62       log.debug("Running command: #{command}") if 
> ImageMagickUtils.log_commands
> > 63       begin
> > 64         result = #{command}
>
> Use CVE-2013-5671 for this vulnerability in the fog-dragonfly gem. As
> far as we can tell, this is a vulnerability in the fog-dragonfly gem,
> not a vulnerability in Dragonfly. We found these possibly related
> fixes in Dragonfly:
>
>   https://github.com/markevans/dragonfly/commit/ff141bb1d921fff506084b62a562f7a83d5e01fe#lib/dragonfly/image_magick/utils.rb
>
>   https://github.com/markevans/dragonfly/commit/47f95bd6b8af11fb0a44d6ab1c6f7d00d880cb68
>
> If the unpatched Dragonfly code has a vulnerability in a common use
> case, this would require a separate CVE ID.
>
> - -- CVE assignment team, MITRE CVE Numbering Authority
> M/S M300
> 202 Burlington Road, Bedford, MA 01730 USA
> [ PGP key available through http://cve.mitre.org/cve/request_id.html ]
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.14 (SunOS)
>
> iQEcBAEBAgAGBQJSI2XoAAoJEGvefgSNfHMdv0oH/j0G7m0PMSwn1FvIcVpR39EP
> yKTuTfa9I5MSr2DXejQQ+5lhJN7eTJwjOTPETpGOu0BkDgMkRvcuw81PqgVwkWXc
> bT8DfNM/cO4vM3UjTJiTKYinVRMl3xsjGVzkwxV0E1mYhjbjrKGNUMgzjNPsSnja
> eNYC26v2UDLn3Jw8K7qXTk+ytgFqOE+MiA/KDXBvm6fB1SBOoeeaMGU7NNdCw8A9
> 95TdYNzYE3JL7V0zz/5oidqkg0hlznK21KR01hUJK0s/U60rdzgA/73O+g8XSP4q
> vyqN0ykgSDodfAt6JsONR/5wzaXTmc25ZXaB3wMGG9yUxFZiORzVGSsWJ7mlad0=
> =SUlN
> -----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.