Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 768609 (CVE-2021-21289)

Summary: <dev-ruby/mechanize-2.7.7: command injection vulnerability (CVE-2021-21289)
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: major CC: ruby
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/sparklemotion/mechanize/security/advisories/GHSA-qrqm-fpv6-6r8g
Whiteboard: B1 [glsa+ cve]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-02-04 02:48:04 UTC
CVE-2021-21289:

Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes' methods which implicitly use Ruby's Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#save_as, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#read_body. This is fixed in version 2.7.7.


Please stabilize mechanize-2.7.7.
Comment 1 Hans de Graaff gentoo-dev Security 2021-02-04 05:56:45 UTC
amd64 stable and cleanup done.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-02-04 14:50:14 UTC
Thanks!
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2021-05-31 21:53:44 UTC
New GLSA request filed.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2021-07-08 03:41:33 UTC
This issue was resolved and addressed in
 GLSA 202107-17 at https://security.gentoo.org/glsa/202107-17
by GLSA coordinator John Helmert III (ajak).