First published: Mon Feb 08 2021(Updated: )
CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1 the download feature has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform. This is fixed in versions 1.3.2 and 2.1.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Carrierwave | <1.3.2 | |
Carrierwave | >=2.0.1<2.1.1 |
https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21288 is a vulnerability in CarrierWave, an open-source RubyGem, that allows for server-side request forgery (SSRF).
The severity of CVE-2021-21288 is medium with a CVSS score of 4.3.
CVE-2021-21288 affects CarrierWave versions 1.3.2 and 2.1.1, allowing attacks to provide DNS entries or IP addresses intended for internal networks.
To fix CVE-2021-21288, upgrade to CarrierWave version 1.3.2 or 2.1.1 or later.
You can find more information about CVE-2021-21288 on the CarrierWave GitHub repository and the provided references.