dragonfly 0.5.7

5 security vulnerabilities found in version 0.5.7

Remote code execution in Dragonfly

critical severity CVE-2021-33564
critical severity CVE-2021-33564
Patched versions: >= 1.4.0

An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.

Dragonfly Gem for Ruby on Windows Shell Escaping Weakness

high severity OSVDB-97854
high severity OSVDB-97854
Patched versions: >= 0.9.6

Dragonfly Gem for Ruby contains a flaw that is due to the program failing to properly escape a shell that contains injected characters. This may allow a context-dependent attacker to potentially execute arbitrary commands.

Dragonfly Gem for Ruby Image Uploading & Processing Remote Command Execution

high severity OSVDB-110439
high severity OSVDB-110439
Patched versions: >= 1.0.7

Dragonfly Gem for Ruby contains a flaw in Uploading & Processing that is due to the gem failing to restrict arbitrary commands to imagemagicks convert. This may allow a remote attacker to gain read/write access to the filesystem and execute arbitrary commands.

Arbitrary file write in dragonfly

high severity CVE-2021-33473
high severity CVE-2021-33473
Patched versions: >= 1.4.0

An argument injection vulnerability in Dragonfly Ruby Gem v1.3.0 allows attackers to read and write arbitrary files when the verify_url option is disabled. This vulnerability is exploited via a crafted URL.

fog-dragonfly Gem for Ruby imagemagickutils.rb Remote Command Execution

high severity CVE-2013-5671
high severity CVE-2013-5671
Patched versions: >= 0.8.4

fog-dragonfly Gem for Ruby contains a flaw that is due to the program failing to properly sanitize input passed via the imagemagickutils.rb script. This may allow a remote attacker to execute arbitrary commands.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Gem version without a license.


Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.

This gem version is available.


This gem version has not been yanked and is still available for usage.