|An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.|
|Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.|
|MISC:https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5 MISC:https://github.com/markevans/dragonfly/compare/v1.3.0…v1.4.0 MISC:https://github.com/markevans/dragonfly/issues/513 MISC:https://github.com/mlr0p/CVE-2021-33564 MISC:https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml MISC:https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/|
|Date Record Created|
|This is a record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities.|
Disclaimer: The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.