FreeBSD : dragonfly -- argument injection (c9e2a1a7-caa1-11eb-904f-14dae9d5a9d2)

critical Nessus Plugin ID 151002

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

NVD reports :

An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.

Solution

Update the affected package.

See Also

https://github.com/mlr0p/CVE-2021-33564

https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/

http://www.nessus.org/u?6a7127a1

Plugin Details

Severity: Critical

ID: 151002

File Name: freebsd_pkg_c9e2a1a7caa111eb904f14dae9d5a9d2.nasl

Version: 1.5

Type: local

Published: 6/25/2021

Updated: 12/12/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-33564

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:rubygem-dragonfly, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/11/2021

Vulnerability Publication Date: 5/24/2021

Exploitable With

Elliot (Dragonfly Ruby Gem File Disclosure)

Reference Information

CVE: CVE-2021-33564