First published: Wed May 07 2025(Updated: )
Rikita Ishikawa discovered that CarrierWave did not correctly sanitize certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-21305) Norihide Saito discovered that CarrierWave did not correctly sanitize certain inputs. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2023-49090)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ruby-carrierwave | <1.3.2-2ubuntu0.24.04.1~esm1 | 1.3.2-2ubuntu0.24.04.1~esm1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/ruby-carrierwave | <1.3.2-2ubuntu0.22.04.1~esm1 | 1.3.2-2ubuntu0.22.04.1~esm1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/ruby-carrierwave | <1.3.1-2ubuntu0.1~esm1 | 1.3.1-2ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/ruby-carrierwave | <1.2.2-1ubuntu0.1~esm1 | 1.2.2-1ubuntu0.1~esm1 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-7497-1 addresses a vulnerability in CarrierWave that could allow an attacker to execute arbitrary code.
To fix USN-7497-1, update the ruby-carrierwave package to the specified remedy version for your Ubuntu release.
USN-7497-1 affects Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
The vulnerability in USN-7497-1 is caused by CarrierWave not correctly sanitizing certain inputs.
Yes, the vulnerability in USN-7497-1 could potentially be exploited to execute arbitrary code remotely.