6.8
CVSSv2

CVE-2019-13574

Published: 12/07/2019 Updated: 24/08/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In lib/mini_magick/image.rb in MiniMagick prior to 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

minimagick project minimagick

debian debian linux 10.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #931932 CVE-2019-13574 Package: ruby-mini-magick; Maintainer for ruby-mini-magick is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for ruby-mini-magick is src:ruby-mini-magick (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> ...
Harsh Jaiswal discovered a remote shell execution vulnerability in ruby-mini-magick, a Ruby library providing a wrapper around ImageMagick or GraphicsMagick, exploitable when using MiniMagick::Imageopen with specially crafted URLs coming from unsanitized user input For the oldstable distribution (stretch), this problem has been fixed in version 4 ...

Github Repositories