Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-21289
HistoryFeb 02, 2021 - 6:50 p.m.

CVE-2021-21289 Command Injection Vulnerability in Mechanize

2021-02-0218:50:13
CWE-78
GitHub_M
www.cve.org

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

8.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.7%

Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes’ methods which implicitly use Ruby’s Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#save_as, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#read_body. This is fixed in version 2.7.7.

CNA Affected

[
  {
    "product": "mechanize",
    "vendor": "sparklemotion",
    "versions": [
      {
        "status": "affected",
        "version": ">= 2.0, < 2.7.7"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

8.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.7%