Sha256: fb8e9d9d24b956855de0b6be4b570f0097b62c5db132662d5e829f2317c69c45
Contents?: true
Size: 526 Bytes
Versions: 1
Compression:
Stored size: 526 Bytes
Contents
gem: mini_magick cve: 2019-13574 url: https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/ title: Remote command execution via filename date: 2019-07-12 description: | A remote shell execution vulnerability when using MiniMagick::Image.open with URL coming from unsanitized user input. e.g. `MiniMagick::Image.open("| touch.txt")` cvss_v3: 7.5 patched_versions: - ">= 4.9.4" related: url: - https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/mini_magick/CVE-2019-13574.yml |