Arbitrary Code Injection Affecting ruby-carrierwave package, versions <1.3.2-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.14% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-RUBYCARRIERWAVE-1564957
  • published11 Feb 2021
  • disclosed8 Feb 2021

Introduced: 8 Feb 2021

CVE-2021-21305  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

Upgrade Debian:12 ruby-carrierwave to version 1.3.2-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ruby-carrierwave package and not the ruby-carrierwave package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.

CVSS Scores

version 3.1