Логотип exploitDog
bind:CVE-2021-21305
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-21305

Количество 4

Количество 4

ubuntu логотип

CVE-2021-21305

около 5 лет назад

CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2021-21305

около 5 лет назад

CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2021-21305

около 5 лет назад

CarrierWave is an open-source RubyGem which provides a simple and flex ...

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-cf3w-g86h-35x4

около 5 лет назад

Code Injection vulnerability in CarrierWave::RMagick

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-21305

CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.

CVSS3: 7.4
3%
Низкий
около 5 лет назад
nvd логотип
CVE-2021-21305

CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1.

CVSS3: 7.4
3%
Низкий
около 5 лет назад
debian логотип
CVE-2021-21305

CarrierWave is an open-source RubyGem which provides a simple and flex ...

CVSS3: 7.4
3%
Низкий
около 5 лет назад
github логотип
GHSA-cf3w-g86h-35x4

Code Injection vulnerability in CarrierWave::RMagick

CVSS3: 7.4
3%
Низкий
около 5 лет назад

Уязвимостей на страницу