An argument injection vulnerability in Dragonfly Ruby Gem v1.3.0 allows attackers to read and write arbitrary files when the verify_url option is disabled. This vulnerability is exploited via a crafted URL.
References
Link | Resource |
---|---|
https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5 | Patch Third Party Advisory |
https://github.com/markevans/dragonfly/issues/513 | Issue Tracking Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220715-0004/ | Third Party Advisory |
Configurations
Information
Published : 2022-06-02 13:15
Updated : 2022-10-27 09:14
NVD link : CVE-2021-33473
Mitre link : CVE-2021-33473
JSON object : View
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Products Affected
dragonfly_project
- dragonfly