mini_magick 1.2.0

2 security vulnerabilities found in version 1.2.0

Remote command execution via filename

high severity CVE-2019-13574
high severity CVE-2019-13574
Patched versions: >= 4.9.4

A remote shell execution vulnerability when using MiniMagick::Image.open with URL coming from unsanitized user input. e.g. MiniMagick::Image.open("| touch.txt")

MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection

high severity CVE-2013-2616
high severity CVE-2013-2616
Patched versions: >= 3.6.0

MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input from an untrusted source passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Gem version without a license.


Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.

This gem version is available.


This gem version has not been yanked and is still available for usage.