vulnerability
Ubuntu: USN-7497-1 (CVE-2023-49090): CarrierWave vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:S/C:C/I:N/A:N) | Nov 29, 2023 | May 7, 2025 | Aug 18, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:C/I:N/A:N)
Published
Nov 29, 2023
Added
May 7, 2025
Modified
Aug 18, 2025
Description
CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. CarrierWave has a Content-Type allowlist bypass vulnerability, possibly leading to XSS. The validation in `allowlisted_content_type?` determines Content-Type permissions by performing a partial match. If the `content_type` argument of `allowlisted_content_type?` is passed a value crafted by the attacker, Content-Types not included in the `content_type_allowlist` will be allowed. This issue has been patched in versions 2.2.5 and 3.0.5.
Solution
ubuntu-pro-upgrade-ruby-carrierwave
References
- CVE-2023-49090
- https://attackerkb.com/topics/CVE-2023-49090
- CWE-79
- UBUNTU-USN-7497-1
- URL-https://github.com/carrierwaveuploader/carrierwave/commit/39b282db5c1303899b3d3381ce8a837840f983b5
- URL-https://github.com/carrierwaveuploader/carrierwave/commit/863d425c76eba12c3294227b39018f6b2dccbbf3
- URL-https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-gxhx-g4fq-49hj
- URL-https://ubuntu.com/security/notices/USN-7497-1
- URL-https://www.cve.org/CVERecord?id=CVE-2023-49090
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.