Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-24720: Prevent remote shell execution in `#apply` · janko/image_processing@038e457

image_processing is an image processing wrapper for libvips and ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the #apply method from image_processing to apply a series of operations that are coming from unsanitized user input allows the attacker to execute shell commands. This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. The vulnerability has been fixed in version 1.12.2 of image_processing. As a workaround, users who process based on user input should always sanitize the user input by allowing only a constrained set of operations.

CVE
#vulnerability

@@ -34,13 +34,13 @@ def instrumenter(&block) def apply(operations) operations.inject(self) do |builder, (name, argument)| if argument == true || argument == nil builder.send(name) builder.public_send(name) elsif argument.is_a?(Array) builder.send(name, *argument) builder.public_send(name, *argument) elsif argument.is_a?(Hash) builder.send(name, **argument) builder.public_send(name, **argument) else builder.send(name, argument) builder.public_send(name, argument) end end end

Related news

Debian Security Advisory 5310-1

Debian Linux Security Advisory 5310-1 - It was discovered that ruby-image-processing, a ruby package that provides higher-level image processing helpers, is prone to a remote shell execution vulnerability when using the #apply method to apply a series of operations coming from unsanitized user input.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907