CVE-2022-24720

image_processing is an image processing wrapper for libvips and ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input allows the attacker to execute shell commands. This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. The vulnerability has been fixed in version 1.12.2 of image_processing. As a workaround, users who process based on user input should always sanitize the user input by allowing only a constrained set of operations.
Configurations

Configuration 1 (hide)

cpe:2.3:a:image_processing_project:image_processing:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:50

Type Values Removed Values Added
References () https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada - Patch () https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada - Patch
References () https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446 - Exploit, Vendor Advisory () https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446 - Exploit, Vendor Advisory
References () https://www.debian.org/security/2022/dsa-5310 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5310 - Third Party Advisory

03 Jul 2023, 20:35

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-Other

Information

Published : 2022-03-01 23:15

Updated : 2024-11-21 06:50


NVD link : CVE-2022-24720

Mitre link : CVE-2022-24720

CVE.ORG link : CVE-2022-24720


JSON object : View

Products Affected

debian

  • debian_linux

image_processing_project

  • image_processing
CWE
CWE-20

Improper Input Validation

NVD-CWE-Other