An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
Metrics
Affected Vendors & Products
References
History
Wed, 25 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 25 Sep 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 23 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ruby
Ruby webrick |
|
CPEs | cpe:2.3:a:ruby:webrick:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ruby
Ruby webrick |
|
Metrics |
ssvc
|
Mon, 23 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | WEBrick: HTTP request smuggling | |
Weaknesses | CWE-444 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sun, 22 Sep 2024 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production." | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-09-22T00:00:00
Updated: 2024-09-25T14:15:45.642637
Reserved: 2024-09-22T00:00:00
Link: CVE-2024-47220
Vulnrichment
Updated: 2024-09-23T15:07:20.012Z
NVD
Status : Awaiting Analysis
Published: 2024-09-22T01:15:11.950
Modified: 2024-09-26T13:32:55.343
Link: CVE-2024-47220
Redhat