MGASA-2024-0348

Source
https://advisories.mageia.org/MGASA-2024-0348.html
Import Source
https://advisories.mageia.org/MGASA-2024-0348.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0348
Related
Published
2024-11-08T22:09:56Z
Modified
2024-11-08T21:44:28Z
Summary
Updated ruby-webrick packages fix security vulnerability
Details

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. (CVE-2024-47220)

References
Credits

Affected packages

Mageia:9 / ruby-webrick

Package

Name
ruby-webrick
Purl
pkg:rpm/mageia/ruby-webrick?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.0-3.mga9

Ecosystem specific

{
    "section": "core"
}