Skip to content

Remote shell execution vulnerability in image_processing

Critical severity GitHub Reviewed Published Mar 1, 2022 in janko/image_processing • Updated May 4, 2023

Package

bundler image_processing (RubyGems)

Affected versions

< 1.12.2

Patched versions

1.12.2

Description

Impact

When using the #apply method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands:

ImageProcessing::Vips.apply({ system: "echo EXECUTED" })
#>> EXECUTED

This method is called internally by Active Storage variants, so Active Storage is vulnerable as well.

Patches

The vulnerability has been fixed in version 1.12.2 of image_processing.

Workarounds

If you're processing based on user input, it's highly recommended that you always sanitize the user input, by allowing only a constrained set of operations. For example:

operations = params[:operations]
  .map { |operation| [operation[:name], *operation[:value]] }
  .select { |name, *| name.to_s.include? %w[resize_to_limit strip ...] } # sanitization

ImageProcessing::Vips.apply(operations)

References

@janko janko published to janko/image_processing Mar 1, 2022
Published to the GitHub Advisory Database Mar 1, 2022
Reviewed Mar 1, 2022
Published by the National Vulnerability Database Mar 1, 2022
Last updated May 4, 2023

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2022-24720

GHSA ID

GHSA-cxf7-qrc5-9446
Checking history
See something to contribute? Suggest improvements for this vulnerability.