CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. CarrierWave has a Content-Type allowlist bypass vulnerability, possibly leading to XSS. The validation in `allowlisted_content_type?` determines Content-Type permissions by performing a partial match. If the `content_type` argument of `allowlisted_content_type?` is passed a value crafted by the attacker, Content-Types not included in the `content_type_allowlist` will be allowed. This issue has been patched in versions 2.2.5 and 3.0.5.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
References | () https://github.com/carrierwaveuploader/carrierwave/commit/39b282db5c1303899b3d3381ce8a837840f983b5 - Patch | |
References | () https://github.com/carrierwaveuploader/carrierwave/commit/863d425c76eba12c3294227b39018f6b2dccbbf3 - Patch | |
References | () https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-gxhx-g4fq-49hj - Vendor Advisory |
05 Dec 2023, 16:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Carrierwave Project
Carrierwave Project carrierwave |
|
CPE | cpe:2.3:a:carrierwave_project:carrierwave:*:*:*:*:*:ruby:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | () https://github.com/carrierwaveuploader/carrierwave/commit/863d425c76eba12c3294227b39018f6b2dccbbf3 - Patch | |
References | () https://github.com/carrierwaveuploader/carrierwave/commit/39b282db5c1303899b3d3381ce8a837840f983b5 - Patch | |
References | () https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-gxhx-g4fq-49hj - Vendor Advisory |
29 Nov 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-29 15:15
Updated : 2024-11-21 08:32
NVD link : CVE-2023-49090
Mitre link : CVE-2023-49090
CVE.ORG link : CVE-2023-49090
JSON object : View
Products Affected
carrierwave_project
- carrierwave
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')