DEBIAN-CVE-2023-49090

Source
https://security-tracker.debian.org/tracker/CVE-2023-49090
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-49090.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-49090
Upstream
Published
2023-11-29T15:15:08.900Z
Modified
2025-11-20T10:16:47.486488Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. CarrierWave has a Content-Type allowlist bypass vulnerability, possibly leading to XSS. The validation in allowlisted_content_type? determines Content-Type permissions by performing a partial match. If the content_type argument of allowlisted_content_type? is passed a value crafted by the attacker, Content-Types not included in the content_type_allowlist will be allowed. This issue has been patched in versions 2.2.5 and 3.0.5.

References

Affected packages

Debian:12 / ruby-carrierwave

Package

Name
ruby-carrierwave
Purl
pkg:deb/debian/ruby-carrierwave?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.2-2

2.*

2.0.2-1
2.2.2-1

3.*

3.0.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}