An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
{
"severity": "CRITICAL",
"nvd_published_at": "2021-05-29T14:15:00Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-88",
"CWE-94"
],
"github_reviewed_at": "2021-06-01T16:59:54Z"
}