Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-21289
HistoryFeb 02, 2021 - 6:50 p.m.

CVE-2021-21289 Command Injection Vulnerability in Mechanize

2021-02-0218:50:13
CWE-78
GitHub_M
www.cve.org
5
mechanize
command injection
vulnerability
ruby
exploitation
untrusted input
cookiejar
download
file.

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

AI Score

8.5

Confidence

High

EPSS

0.003

Percentile

69.7%

Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes’ methods which implicitly use Ruby’s Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#save_as, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#read_body. This is fixed in version 2.7.7.

CNA Affected

[
  {
    "product": "mechanize",
    "vendor": "sparklemotion",
    "versions": [
      {
        "status": "affected",
        "version": ">= 2.0, < 2.7.7"
      }
    ]
  }
]

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

AI Score

8.5

Confidence

High

EPSS

0.003

Percentile

69.7%