First published: Mon Feb 08 2021(Updated: )
CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Carrierwave | <1.3.2 | |
Carrierwave | >=2.0.1<2.1.1 | |
debian/ruby-carrierwave | 1.3.2-2 |
https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21305 is a code injection vulnerability in CarrierWave, an open-source RubyGem for uploading files from Ruby applications.
CVE-2021-21305 has a severity rating of 8.8, which is considered high.
CVE-2021-21305 affects CarrierWave versions before 1.3.2 and 2.1.1.
CVE-2021-21305 has CWE IDs 94 and 74.
To fix CVE-2021-21305, upgrade CarrierWave to version 1.3.2 or 2.1.1 or later.