CVE-2024-29034Interpretation Conflict in Carrierwave

Severity
6.1MEDIUMNVD
CNA6.8
EPSS
0.1%
top 77.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 24
Latest updateMar 25

Description

CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. The vulnerability CVE-2023-49090 wasn't fully addressed. This vulnerability is caused by the fact that when uploading to object storage, including Amazon S3, it is possible to set a Content-Type value that is interpreted by browsers to be different from what's allowed by `content_type_allowlist`, by providing multiple values separated by commas. This bypassed value can be used to cause XSS. Upgrade to 3.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages3 packages

CVEListV5carrierwaveuploader/carrierwave< 2.2.6+1
NVDcarrierwave_project/carrierwave3.0.03.0.7+1
RubyGemscarrierwave_project/carrierwave3.0.03.0.7+1

Patches

🔴Vulnerability Details

4
OSV
CarrierWave content-Type allowlist bypass vulnerability which possibly leads to XSS remained2024-03-25
GHSA
CarrierWave content-Type allowlist bypass vulnerability which possibly leads to XSS remained2024-03-25
OSV
CVE-2024-29034: CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks2024-03-24
CVEList
CarrierWave's Content-Type allowlist bypass vulnerability which possibly leads to XSS remained2024-03-24

📋Vendor Advisories

1
Debian
CVE-2024-29034: ruby-carrierwave - CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web...2024
CVE-2024-29034 — Interpretation Conflict in Carrierwave | cvebase