Miggo Logo

GHSA-q95h-cqrv-8jv5: ExifTool vulnerable to arbitrary code execution

7.8

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
1/20/2023
Updated
1/20/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
exiftool_vendoredrubygems< 12.25.012.25.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability (CVE-2021-22204) stems from improper handling of DjVu annotation chunks. ExifTool's DjVu.pm module processes ANT chunks using the system() function with unsanitized input from file metadata. This matches the CWE-74 injection pattern and the exploit methodology observed in real-world attacks where crafted metadata triggers command execution. The function name and file path are consistent with ExifTool's structure and historical vulnerability disclosures.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *r*itr*ry *o** *x**ution **n o**ur w**n runnin* `*xi*tool` ***inst *il*s wit* *ostil* m*t***t* p*ylo**s ### P*t***s *xi*Tool **s *lr***y ***n p*t**** in v*rsion **.**. `*xi*tool_v*n*or**.r*`, w*i** v*n*ors *xi*Tool, in*lu**s t*is p*t** in

Reasoning

T** vuln*r**ility (*V*-****-*****) st*ms *rom improp*r **n*lin* o* *jVu *nnot*tion **unks. *xi*Tool's *jVu.pm mo*ul* pro**ss*s *NT **unks usin* t** syst*m() *un*tion wit* uns*nitiz** input *rom *il* m*t***t*. T*is m*t***s t** *W*-** inj**tion p*tt*rn