Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-47220

Опубликовано: 22 сент. 2024
Источник: debian

Описание

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-webrickfixed1.9.1-1package
ruby-webrickno-dsabookwormpackage

Примечания

  • https://github.com/ruby/webrick/issues/145

  • Fixed by: https://github.com/ruby/webrick/commit/f5faca9222541591e1a7c3c97552ebb0c92733c7 (v1.8.2)

Связанные уязвимости

ubuntu
12 месяцев назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

CVSS3: 7.5
redhat
12 месяцев назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

nvd
12 месяцев назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

suse-cvrf
10 месяцев назад

Security update for ruby2.1

CVSS3: 7.5
github
12 месяцев назад

HTTP Request Smuggling in ruby webrick