CVE-2022-24720
Publication date 1 March 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
image_processing is an image processing wrapper for libvips and ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input allows the attacker to execute shell commands. This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. The vulnerability has been fixed in version 1.12.2 of image_processing. As a workaround, users who process based on user input should always sanitize the user input by allowing only a constrained set of operations.
Status
Package | Ubuntu Release | Status |
---|---|---|
ruby-image-processing | 24.04 LTS noble |
Not affected
|
22.04 LTS jammy |
Fixed 1.10.3-1ubuntu0.22.04.1
|
|
20.04 LTS focal |
Fixed 1.10.3-1ubuntu0.20.04.1
|
|
16.04 LTS xenial | Ignored end of standard support | |
14.04 LTS trusty | Ignored end of standard support |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6675-1
- ImageProcessing vulnerability
- 5 March 2024
Other references
- https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446
- https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada (v1.12.2)
- https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada
- https://www.cve.org/CVERecord?id=CVE-2022-24720