#VU50707 Code Injection in CarrierWave - CVE-2021-21305
Published: February 15, 2021
CarrierWave
CarrierWave
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the #manipulate! method inappropriately evals the content of mutation option (:read/ :write). A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08
- https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08
- https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7
- https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4
- https://rubygems.org/gems/carrierwave