An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url
option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
{ "nvd_published_at": "2021-05-29T14:15:00Z", "cwe_ids": [ "CWE-88", "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-06-01T16:59:54Z" }