6.8
CVSSv2

CVE-2019-13574

Published: 12/07/2019 Updated: 07/10/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In lib/mini_magick/image.rb in MiniMagick prior to 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.

Vulnerability Trend

Affected Products

Vendor Product Versions
Minimagick ProjectMinimagick1.2.5, 3.4, 3.5.0, 3.6.0, 3.7.0, 3.8.0, 3.8.1, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.2.5, 4.2.6, 4.2.7, 4.2.8, 4.2.9, 4.2.10, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.4.0, 4.5.0, 4.5.1, 4.6.0, 4.6.1, 4.7.0, 4.7.1, 4.7.2, 4.8.0, 4.9.0, 4.9.1, 4.9.2, 4.9.3
DebianDebian Linux9.0, 10.0

Vendor Advisories

Debian Bug report logs - #931932 CVE-2019-13574 Package: ruby-mini-magick; Maintainer for ruby-mini-magick is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for ruby-mini-magick is src:ruby-mini-magick (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> ...
Harsh Jaiswal discovered a remote shell execution vulnerability in ruby-mini-magick, a Ruby library providing a wrapper around ImageMagick or GraphicsMagick, exploitable when using MiniMagick::Imageopen with specially crafted URLs coming from unsanitized user input For the oldstable distribution (stretch), this problem has been fixed in version 4 ...

Mailing Lists

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4481-1 security () debian org wwwdebianorg/security/ Salvatore Bonaccorso July 13, 2019 wwwdebianorg/security/faq ...

Github Repositories

PoC CVE-2019-13574

Ruby Advisory Database The Ruby Advisory Database is a community effort to compile all security advisories that are relevant to Ruby libraries You can check your own Gemfilelocks against this database by using bundler-audit Support Ruby security! Do you know about a vulnerability that isn't listed in this database? Open an issue, submit a PR, or use this form which will