CVE-2023-49090: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
(updated )
CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. CarrierWave has a Content-Type allowlist bypass vulnerability, possibly leading to XSS. The validation in allowlisted_content_type?
determines Content-Type permissions by performing a partial match. If the content_type
argument of allowlisted_content_type?
is passed a value crafted by the attacker, Content-Types not included in the content_type_allowlist
will be allowed. This issue has been patched in versions 2.2.5 and 3.0.5.
References
- github.com/advisories/GHSA-gxhx-g4fq-49hj
- github.com/carrierwaveuploader/carrierwave/blob/master/lib/carrierwave/uploader/content_type_allowlist.rb
- github.com/carrierwaveuploader/carrierwave/commit/39b282db5c1303899b3d3381ce8a837840f983b5
- github.com/carrierwaveuploader/carrierwave/commit/863d425c76eba12c3294227b39018f6b2dccbbf3
- github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-gxhx-g4fq-49hj
- nvd.nist.gov/vuln/detail/CVE-2023-49090
- rubygems.org/gems/carrierwave/versions/2.2.5
- rubygems.org/gems/carrierwave/versions/3.0.5
Detect and mitigate CVE-2023-49090 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →