CVE-2021-21289

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-21289
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-21289.json
Aliases
Related
Published
2021-02-02T19:15:14Z
Modified
2023-11-29T08:41:24.401246Z
Details

Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes' methods which implicitly use Ruby's Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#saveas, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#readbody. This is fixed in version 2.7.7.

References

Affected packages

Git / github.com/sparklemotion/mechanize

Affected ranges

Type
GIT
Repo
https://github.com/sparklemotion/mechanize
Events

Affected versions

v2.*

v2.0
v2.0.1
v2.1
v2.1.1
v2.1.pre.1
v2.2
v2.2.1
v2.3
v2.4
v2.5
v2.5.1
v2.6.0
v2.7.0
v2.7.1
v2.7.2
v2.7.3
v2.7.4
v2.7.4.beta1
v2.7.4.beta2
v2.7.4.beta3
v2.7.5
v2.7.6