CVE-2021-21289

HIGH

Mechanize <2.7.7 - Command Injection

Title source: llm
STIX 2.1

Description

Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes' methods which implicitly use Ruby's Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#save_as, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#read_body. This is fixed in version 2.7.7.

References (8)

Core 8
Core References
Product, Third Party Advisory x_refsource_misc
https://rubygems.org/gems/mechanize/
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/sparklemotion/mechanize/releases/tag/v2.7.7
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/02/msg00021.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202107-17

Scores

CVSS v3 7.4
EPSS 0.0250
EPSS Percentile 85.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

Details

CWE
CWE-78
Status published
Products (5)
debian/debian_linux 9.0
fedoraproject/fedora 32
fedoraproject/fedora 33
mechanize_project/mechanize 2.0 - 2.7.7
rubygems/mechanize 2.0.0 - 2.7.7RubyGems
Published Feb 02, 2021
Tracked Since Feb 18, 2026