Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47220

Опубликовано: 22 сент. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

A flaw was found in the webrick toolkit. This issue occurs because the server incorrectly handles requests with both Content-Length and Transfer-Encoding headers. This can allow an attacker to sneak in an extra request such as GET /admin after the normal request POST /user. As a result, unauthorized users can access restricted areas like /admin by POST /user.

Отчет

This CVE is rated as having Moderate impact because Webrick should not be used in production. It is only still maintained because there are other gems relying on it, most of which do so only for testing, and only because it is a pure ruby implementation and it was shipped with Ruby in the past.

Меры по смягчению последствий

As a temporary workaround, avoid using WEBrick in production environments. If you must use it, ensure that your application is behind a reverse proxy that can handle request validation and filtering to mitigate the risk of HTTP request smuggling.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23scale-amp-backend-containerWill not fix
Red Hat 3scale API Management Platform 23scale-amp-system-containerWill not fix
Red Hat 3scale API Management Platform 23scale-amp-zync-containerWill not fix
Red Hat Enterprise Linux 10pcsNot affected
Red Hat Enterprise Linux 9pcsNot affected
Red Hat Satellite 6rubygem-webrickAffected
Red Hat Satellite 6satellite-capsule:el8/rubygem-webrickAffected
Red Hat Satellite 6satellite:el8/rubygem-webrickAffected
RHOL-5.9-RHEL-9openshift-logging/cluster-logging-operator-bundleFixedRHSA-2025:122712.02.2025
RHOL-5.9-RHEL-9openshift-logging/cluster-logging-rhel9-operatorFixedRHSA-2025:122712.02.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444

EPSS

Процентиль: 29%
0.00108
Низкий

7.5 High

CVSS3

Связанные уязвимости

ubuntu
больше 1 года назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

nvd
больше 1 года назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

debian
больше 1 года назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. ...

suse-cvrf
больше 1 года назад

Security update for ruby2.1

CVSS3: 7.5
github
больше 1 года назад

HTTP Request Smuggling in ruby webrick

EPSS

Процентиль: 29%
0.00108
Низкий

7.5 High

CVSS3