dragonfly 0.9.13

4 security vulnerabilities found in version 0.9.13

Remote code execution in Dragonfly

critical severity CVE-2021-33564
critical severity CVE-2021-33564
Patched versions: >= 1.4.0

An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.

Dragonfly Gem for Ruby Image Uploading & Processing Remote Command Execution

high severity OSVDB-110439
high severity OSVDB-110439
Patched versions: >= 1.0.7

Dragonfly Gem for Ruby contains a flaw in Uploading & Processing that is due to the gem failing to restrict arbitrary commands to imagemagicks convert. This may allow a remote attacker to gain read/write access to the filesystem and execute arbitrary commands.

Arbitrary file write in dragonfly

high severity CVE-2021-33473
high severity CVE-2021-33473
Patched versions: >= 1.4.0

An argument injection vulnerability in Dragonfly Ruby Gem v1.3.0 allows attackers to read and write arbitrary files when the verify_url option is disabled. This vulnerability is exploited via a crafted URL.

High severity vulnerability that affects dragonfly

high severity CVE-2013-5671
high severity CVE-2013-5671
Affected versions: <= 0.9.15

lib/dragonfly/imagemagickutils.rb in the fog-dragonfly gem 0.8.2 for Ruby allows remote attackers to execute arbitrary commands via unspecified vectors.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.