An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Enterprise Linux Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Rhel Software Collections Subscribe
Ruby-lang Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2391-1 ruby2.3 security update
Debian DLA Debian DLA DLA-2392-1 jruby security update
Debian DLA Debian DLA DLA-3408-1 jruby security update
Github GHSA Github GHSA GHSA-gwfg-cqmg-cf8f WEBRick vulnerable to HTTP Request/Response Smuggling
Ubuntu USN Ubuntu USN USN-4882-1 Ruby vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:33:05.751Z

Reserved: 2020-09-16T00:00:00

Link: CVE-2020-25613

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-06T13:15:13.823

Modified: 2024-11-21T05:18:14.437

Link: CVE-2020-25613

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-09-29T00:00:00Z

Links: CVE-2020-25613 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses