CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.
References
Link | Resource |
---|---|
https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08 | Release Notes Third Party Advisory |
https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08 | Release Notes Third Party Advisory |
https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7 | Patch Third Party Advisory |
https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4 | Exploit Third Party Advisory |
https://rubygems.org/gems/carrierwave | Product Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-02-08T19:20:14
Updated: 2021-02-08T19:20:14
Reserved: 2020-12-22T00:00:00
Link: CVE-2021-21305
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-02-08T20:15:12.527
Modified: 2022-04-26T15:59:28.000
Link: CVE-2021-21305
JSON object: View
Redhat Information
No data.