7.5
CVSSv2

CVE-2021-21305

Published: 08/02/2021 Updated: 26/04/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave prior to 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing malicious users to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

carrierwave project carrierwave

Vendor Advisories

Debian Bug report logs - #982551 ruby-carrierwave: CVE-2021-21305 Package: src:ruby-carrierwave; Maintainer for src:ruby-carrierwave is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 11 Feb 2021 17:42:02 UTC Severi ...