Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-47220

Опубликовано: 22 сент. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий

Описание

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

РелизСтатусПримечание
devel

released

1.8.1-1ubuntu1
esm-apps/jammy

released

1.7.0-3ubuntu0.1
esm-infra/focal

DNE

focal

DNE

jammy

released

1.7.0-3ubuntu0.1
noble

released

1.8.1-1ubuntu0.1
oracular

released

1.8.1-1ubuntu1
plucky

released

1.8.1-1ubuntu1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 32%
0.00119
Низкий

Связанные уязвимости

CVSS3: 7.5
redhat
12 месяцев назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

nvd
12 месяцев назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

debian
12 месяцев назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. ...

suse-cvrf
10 месяцев назад

Security update for ruby2.1

CVSS3: 7.5
github
12 месяцев назад

HTTP Request Smuggling in ruby webrick

EPSS

Процентиль: 32%
0.00119
Низкий