Remote shell execution vulnerability in image_processing
Critical severity
GitHub Reviewed
Published
Mar 1, 2022
in
janko/image_processing
•
Updated May 4, 2023
Description
Published to the GitHub Advisory Database
Mar 1, 2022
Reviewed
Mar 1, 2022
Published by the National Vulnerability Database
Mar 1, 2022
Last updated
May 4, 2023
Impact
When using the
#apply
method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands:This method is called internally by Active Storage variants, so Active Storage is vulnerable as well.
Patches
The vulnerability has been fixed in version 1.12.2 of image_processing.
Workarounds
If you're processing based on user input, it's highly recommended that you always sanitize the user input, by allowing only a constrained set of operations. For example:
References