Описание
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | vulnerable code not present |
| esm-apps/bionic | needed | |
| esm-apps/focal | needed | |
| esm-apps/noble | not-affected | vulnerable code not present |
| esm-apps/xenial | needed | |
| esm-infra-legacy/trusty | needed | |
| jammy | DNE | |
| noble | not-affected | vulnerable code not present |
| plucky | not-affected | vulnerable code not present |
| questing | not-affected | vulnerable code not present |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1.8.1-1ubuntu1 |
| esm-apps/jammy | DNE | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| jammy | released | 1.7.0-3ubuntu0.1 |
| noble | released | 1.8.1-1ubuntu0.1 |
| oracular | released | 1.8.1-1ubuntu1 |
| plucky | released | 1.8.1-1ubuntu1 |
| questing | released | 1.8.1-1ubuntu1 |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra/xenial | released | 2.3.1-2~ubuntu16.04.16+esm11 |
| jammy | DNE | |
| noble | DNE | |
| plucky | DNE | |
| questing | DNE | |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra/bionic | released | 2.5.1-1ubuntu1.16+esm6 |
| jammy | DNE | |
| noble | DNE | |
| plucky | DNE | |
| questing | DNE | |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra/focal | released | 2.7.0-5ubuntu1.18+esm3 |
| jammy | DNE | |
| noble | DNE | |
| plucky | DNE | |
| questing | DNE | |
| upstream | needs-triage |
Показывать по
Связанные уязвимости
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. ...