GHSA-q95h-cqrv-8jv5: ExifTool vulnerable to arbitrary code execution
7.8
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
1/20/2023
Updated
1/20/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| exiftool_vendored | rubygems | < 12.25.0 | 12.25.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability (CVE-2021-22204) stems from improper handling of DjVu annotation chunks. ExifTool's DjVu.pm module processes ANT chunks using the system() function with unsanitized input from file metadata. This matches the CWE-74 injection pattern and the exploit methodology observed in real-world attacks where crafted metadata triggers command execution. The function name and file path are consistent with ExifTool's structure and historical vulnerability disclosures.