logo

CVE-2022-21831 activestorage

Package

Manager: gem
Name: activestorage
Vulnerable Version: >=5.2.0 <5.2.6.3 || >=6.0.0 <6.0.4.7 || >=6.1.0 <6.1.4.7 || >=7.0.0 <7.0.2.3

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01141 pctl0.77617

Details

Possible code injection vulnerability in Rails / Active Storage The Active Storage module of Rails starting with version 5.2.0 is possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally, a strict ImageMagick security policy will help mitigate this issue.

Metadata

Created: 2022-03-08T21:25:54Z
Modified: 2022-06-21T15:59:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-w749-p3v6-hccq/GHSA-w749-p3v6-hccq.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-w749-p3v6-hccq
Finding: F422
Auto approve: 1