Server-side request forgery in CarrierWave
Moderate severity
GitHub Reviewed
Published
Feb 8, 2021
in
carrierwaveuploader/carrierwave
•
Updated May 16, 2023
Package
Affected versions
< 1.3.2
>= 2.0.0, < 2.1.1
Patched versions
1.3.2
2.1.1
Description
Reviewed
Feb 8, 2021
Published to the GitHub Advisory Database
Feb 8, 2021
Published by the National Vulnerability Database
Feb 8, 2021
Last updated
May 16, 2023
Impact
CarrierWave download feature has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform.
Patches
Upgrade to 2.1.1 or 1.3.2.
Workarounds
Using proper network segmentation and applying the principle of least privilege to outbound connections from application servers can reduce the severity of SSRF vulnerabilities. Ideally the vulnerable gem should run on an isolated server without access to any internal network resources or cloud metadata access.
References
Server-Side Request Forgery Prevention Cheat Sheet
For more information
If you have any questions or comments about this advisory:
References