GHSA-6f62-3596-g6w7

Suggest an improvement
Source
https://github.com/advisories/GHSA-6f62-3596-g6w7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-6f62-3596-g6w7/GHSA-6f62-3596-g6w7.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-6f62-3596-g6w7
Aliases
Published
2024-09-22T03:30:30Z
Modified
2024-09-25T18:56:02.336327Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
HTTP Request Smuggling in ruby webrick
Details

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

Database specific
{
    "nvd_published_at": "2024-09-22T01:15:11Z",
    "cwe_ids": [
        "CWE-444"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-09-23T20:43:55Z"
}
References

Affected packages

RubyGems / webrick

Package

Name
webrick
Purl
pkg:gem/webrick

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.2

Affected versions

1.*

1.3.1
1.4.0.beta1
1.4.0
1.4.1
1.4.2
1.4.3
1.4.4
1.5.0
1.5.1
1.6.0
1.6.1
1.7.0
1.8.0
1.8.1

Database specific

{
    "last_known_affected_version_range": "<= 1.8.1"
}