3 results (0.003 seconds)

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

An argument injection vulnerability in Dragonfly Ruby Gem v1.3.0 allows attackers to read and write arbitrary files when the verify_url option is disabled. This vulnerability is exploited via a crafted URL. Una vulnerabilidad de inyección de argumentos en Dragonfly Ruby Gem versión v1.3.0, permite a atacantes leer y escribir archivos arbitrarios cuando la opción verify_url está deshabilitada. Esta vulnerabilidad es explotada por medio de una URL diseñada • https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5 https://github.com/markevans/dragonfly/issues/513 https://security.netapp.com/advisory/ntap-20220715-0004 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 9.8EPSS: 12%CPEs: 1EXPL: 4

An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility. Una vulnerabilidad de inyección de argumentos en Dragonfly gem versiones anteriores a 1.4.0 para Ruby, permite a atacantes remotos leer y escribir en archivos arbitrarios por medio de una URL diseñada cuando la opción verify_url está deshabilitada. Esto puede conllevar a una ejecución de código. • https://github.com/mlr0p/CVE-2021-33564 https://github.com/dorkerdevil/CVE-2021-33564 https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5 https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0 https://github.com/markevans/dragonfly/issues/513 https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 2

The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running. • http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041177.html http://www.redteam-pentesting.de/advisories/rt-sa-2005-015.txt http://www.redteam-pentesting.de/advisories/rt-sa-2005-15.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/24037 •