CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-02-08T19:20:14
Updated: 2024-08-03T18:09:15.001Z
Reserved: 2020-12-22T00:00:00
Link: CVE-2021-21305
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-02-08T20:15:12.527
Modified: 2024-11-21T05:47:59.093
Link: CVE-2021-21305
Redhat
No data.