CVE-2013-1756 – dragonfly
Package
Manager: gem
Name: dragonfly
Vulnerable Version: >=0.7 <0.8.6 || >=0.9 <0.9.13
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:H/RL:U/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.01982 pctl0.82875
Details
Dragonfly Code Injection vulnerability The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request.
Metadata
Created: 2017-10-24T18:33:37Z
Modified: 2025-04-14T21:47:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-p463-639r-q9g9/GHSA-p463-639r-q9g9.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-p463-639r-q9g9
Finding: F422
Auto approve: 1