Vulnerability CVE-2019-13574


Published: 2019-07-11   Modified: 2019-07-12

Description:
In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.

Type:

CWE-20

(Improper Input Validation)

Vendor: Debian
Product: Debian linux 
Version: 9.0; 10.0;
Vendor: Minimagick project
Product: Minimagick 
Version:
4.9.3
4.9.2
4.9.1
4.9.0
4.8.0
4.7.2
4.7.1
4.7.0
4.6.1
4.6.0
4.5.1
4.5.0
4.4.0
4.3.6
4.3.5
4.3.4
4.3.3
4.3.2
4.3.1
4.3.0
4.2.9
4.2.8
4.2.7
4.2.6
4.2.5
4.2.4
4.2.3
4.2.2
4.2.10
4.2.1
4.2.0
4.1.1
4.1.0
4.0.4
4.0.3
4.0.2
4.0.1
4.0.0
3.8.1
3.8.0
3.7.0
3.6.0
3.5.0
3.4
1.2.5

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/
https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851
https://github.com/minimagick/minimagick/compare/d484786...293f9bb
https://github.com/minimagick/minimagick/releases/tag/v4.9.4
https://seclists.org/bugtraq/2019/Jul/20
https://www.debian.org/security/2019/dsa-4481

Copyright 2019, cxsecurity.com

 

Back to Top