Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-47220

Опубликовано: 22 сент. 2024
Источник: ubuntu
Приоритет: medium

Описание

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

РелизСтатусПримечание
devel

not-affected

vulnerable code not present
esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/noble

not-affected

vulnerable code not present
esm-apps/xenial

needed

esm-infra-legacy/trusty

needed

jammy

DNE

noble

not-affected

vulnerable code not present
plucky

not-affected

vulnerable code not present
questing

not-affected

vulnerable code not present

Показывать по

РелизСтатусПримечание
devel

released

1.8.1-1ubuntu1
esm-apps/jammy

DNE

esm-infra/focal

DNE

focal

DNE

jammy

released

1.7.0-3ubuntu0.1
noble

released

1.8.1-1ubuntu0.1
oracular

released

1.8.1-1ubuntu1
plucky

released

1.8.1-1ubuntu1
questing

released

1.8.1-1ubuntu1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/xenial

released

2.3.1-2~ubuntu16.04.16+esm11
jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

released

2.5.1-1ubuntu1.16+esm6
jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

released

2.7.0-5ubuntu1.18+esm3
jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

Связанные уязвимости

CVSS3: 7.5
redhat
около 1 года назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

nvd
около 1 года назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

debian
около 1 года назад

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. ...

suse-cvrf
12 месяцев назад

Security update for ruby2.1

CVSS3: 7.5
github
около 1 года назад

HTTP Request Smuggling in ruby webrick