CVE-2021-21305

CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:carrierwave_project:carrierwave:*:*:*:*:*:ruby:*:*
cpe:2.3:a:carrierwave_project:carrierwave:*:*:*:*:*:ruby:*:*

History

26 Apr 2022, 15:59

Type Values Removed Values Added
CWE CWE-74 CWE-94

Information

Published : 2021-02-08 20:15

Updated : 2024-02-04 21:23


NVD link : CVE-2021-21305

Mitre link : CVE-2021-21305

CVE.ORG link : CVE-2021-21305


JSON object : View

Products Affected

carrierwave_project

  • carrierwave
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')