Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2021-21289
Description:Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes' methods which implicitly use Ruby's Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#save_as, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#read_body. This is fixed in version 2.7.7.
Test IDs: 1.3.6.1.4.1.25623.1.1.10.2021.0124   1.3.6.1.4.1.25623.1.0.878920   1.3.6.1.4.1.25623.1.0.892561   1.3.6.1.4.1.25623.1.0.878923  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2021-21289
https://github.com/sparklemotion/mechanize/security/advisories/GHSA-qrqm-fpv6-6r8g
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBVVJUL4P4KCJH4IQTHFZ4ATXY7XXZPV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNFZ7ROYS6V4J5L5PRAJUG2AWC7VXR2V/
https://security.gentoo.org/glsa/202107-17
https://github.com/sparklemotion/mechanize/commit/66a6a1bfa653a5f13274a396a5e5441238656aa0
https://github.com/sparklemotion/mechanize/commit/66a6a1bfa653a5f13274a396a5e5441238656aa0
https://github.com/sparklemotion/mechanize/releases/tag/v2.7.7
https://github.com/sparklemotion/mechanize/releases/tag/v2.7.7
https://rubygems.org/gems/mechanize/
https://rubygems.org/gems/mechanize/
https://lists.debian.org/debian-lts-announce/2021/02/msg00021.html




© 1998-2025 E-Soft Inc. All rights reserved.