dragonfly 1.2.1

2 security vulnerabilities found in version 1.2.1

Remote code execution in Dragonfly

critical severity CVE-2021-33564
critical severity CVE-2021-33564
Patched versions: >= 1.4.0

An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.

Arbitrary file write in dragonfly

high severity CVE-2021-33473
high severity CVE-2021-33473
Patched versions: >= 1.4.0

An argument injection vulnerability in Dragonfly Ruby Gem v1.3.0 allows attackers to read and write arbitrary files when the verify_url option is disabled. This vulnerability is exploited via a crafted URL.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.