CVE-2021-21305Injection in Carrierwave

Severity
8.8HIGHNVD
CNA7.4
EPSS
2.8%
top 13.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 8
Latest updateMay 7

Description

CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fix

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5carrierwaveuploader/carrierwave< 1.3.2+1
NVDcarrierwave_project/carrierwave2.0.12.1.1+1
RubyGemscarrierwave_project/carrierwave2.0.02.1.1+1

Patches

🔴Vulnerability Details

5
OSV
ruby-carrierwave vulnerabilities2025-05-07
OSV
CVE-2021-21305: CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications2021-02-08
CVEList
Code Injection vulnerability in CarrierWave2021-02-08
OSV
Code Injection vulnerability in CarrierWave::RMagick2021-02-08
GHSA
Code Injection vulnerability in CarrierWave::RMagick2021-02-08

📋Vendor Advisories

2
Ubuntu
CarrierWave vulnerabilities2025-05-07
Debian
CVE-2021-21305: ruby-carrierwave - CarrierWave is an open-source RubyGem which provides a simple and flexible way t...2021
CVE-2021-21305 — Injection in Carrierwave | cvebase