Server-Side Request Forgery (SSRF) Affecting ruby-carrierwave package, versions <1.3.2-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.08% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN12-RUBYCARRIERWAVE-1564956
  • published11 Feb 2021
  • disclosed8 Feb 2021

Introduced: 8 Feb 2021

CVE-2021-21288  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade Debian:12 ruby-carrierwave to version 1.3.2-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ruby-carrierwave package and not the ruby-carrierwave package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1 the download feature has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform. This is fixed in versions 1.3.2 and 2.1.1.

CVSS Scores

version 3.1