MGASA-2021-0124

Source
https://advisories.mageia.org/MGASA-2021-0124.html
Import Source
https://advisories.mageia.org/MGASA-2021-0124.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0124
Related
Published
2021-03-12T01:25:47Z
Modified
2021-03-12T00:14:13Z
Summary
Updated ruby-mechanize packages fix a security vulnerability
Details

In Mechanize, from v2.0.0 until v2.7.7, there is a command injection vulnerability. Affected versions of Mechanize allow for OS commands to be injected using several classes' methods which implicitly use Ruby's Kernel#open method (CVE-2021-21289).

References
Credits

Affected packages

Mageia:7 / ruby-mechanize

Package

Name
ruby-mechanize
Purl
pkg:rpm/mageia/ruby-mechanize?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.6-2.1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / ruby-mechanize

Package

Name
ruby-mechanize
Purl
pkg:rpm/mageia/ruby-mechanize?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.6-3.1.mga8

Ecosystem specific

{
    "section": "core"
}