首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Fog Dragonfly 0.8.2 Command Injection Vulnerability
来源:@_larry0 作者:Cashdollar 发布时间:2013-09-10  
TITLE: Remote Command Injection in fog-dragonfly-0.8.2 Ruby Gem
  
Credit: Larry W. Cashdollar, @_larry0
  
Date: 8/16/2013
  
CVE: 2013-5671
  
  
Description:
"Dragonfly is an on-the-fly Rack-based image handling framework. It is suitable for use with Rails, Sinatra and other web frameworks. Although it's mainly used for images, it can handle any content type."
Unescaped user supplied input is passed to the command line for shell execution:
from fog-dragonfly-0.8.2/lib/dragonfly/imagemagickutils.rb:
  
20     def convert(tempobject, args='', format=nil)
 21       tempfile = newtempfile(format)
 22       run "#{convertcommand} #{args} #{tempobject.path} #{tempfile.path}"
 23       tempfile
 24     end
.
.
.
  
61     def run(command)
 62       log.debug("Running command: #{command}") if ImageMagickUtils.log_commands
 63       begin
 64         result = #{command}
  
  
Vendor Notified: 8/16/2013

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·WinArchiver 3.2 SEH Buffer Ove
·freeFTPd 1.0.10 PASS Command S
·FuzeZip 1.0 SEH Buffer Overflo
·HP SiteScope Remote Code Execu
·PWStore 2010.8.30.0 Cross Site
·MS13-055 Microsoft Internet Ex
·GreenBrowser 6.4.0515 - Heap O
·Watchguard Server Center 11.7.
·Oracle Java lookUpByteBI - Hea
·eM Client e-mail client v5.0.1
·PotPlayer 1.5.39036 (.wav) - C
·MS13-053 Win32k Memory Allocat
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved