CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1 the download feature has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform. This is fixed in versions 1.3.2 and 2.1.1.
References
Link | Resource |
---|---|
https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08 | Release Notes Third Party Advisory |
https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08 | Release Notes Third Party Advisory |
https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0 | Patch Third Party Advisory |
https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5 | Third Party Advisory |
https://rubygems.org/gems/carrierwave/ | Product Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-02-08 20:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-21288
Mitre link : CVE-2021-21288
CVE.ORG link : CVE-2021-21288
JSON object : View
Products Affected
carrierwave_project
- carrierwave
CWE
CWE-918
Server-Side Request Forgery (SSRF)