An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
History

Wed, 25 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
References

Wed, 25 Sep 2024 05:45:00 +0000

Type Values Removed Values Added
References

Mon, 23 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ruby
Ruby webrick
CPEs cpe:2.3:a:ruby:webrick:*:*:*:*:*:*:*:*
Vendors & Products Ruby
Ruby webrick
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Title WEBrick: HTTP request smuggling
Weaknesses CWE-444
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

threat_severity

Moderate


Sun, 22 Sep 2024 00:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-09-22T00:00:00

Updated: 2024-09-25T14:15:45.642637

Reserved: 2024-09-22T00:00:00

Link: CVE-2024-47220

cve-icon Vulnrichment

Updated: 2024-09-23T15:07:20.012Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-22T01:15:11.950

Modified: 2024-09-26T13:32:55.343

Link: CVE-2024-47220

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-09-22T01:15:11Z

Links: CVE-2024-47220 - Bugzilla