Search for packages
| purl | pkg:gem/webrick@1.3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3wgz-s6g4-n3fk
Aliases: CVE-2024-47220 GHSA-6f62-3596-g6w7 |
HTTP Request Smuggling in ruby webrick An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production." |
Affected by 0 other vulnerabilities. |
|
VCID-91b7-xx8t-rqhr
Aliases: CVE-2017-10784 GHSA-369m-2gv6-mw28 |
Improper Authentication The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name. |
Affected by 3 other vulnerabilities. |
|
VCID-bv9s-j5yk-m3aw
Aliases: CVE-2009-4492 GHSA-6mq2-37j5-w6r6 OSV-61774 |
WEBrick Improper Input Validation vulnerability WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. |
Affected by 3 other vulnerabilities. |
|
VCID-pay9-phaz-bbde
Aliases: CVE-2025-6442 GHSA-r995-q44h-hr64 |
Ruby WEBrick read_headers method can lead to HTTP Request/Response Smuggling Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876. |
Affected by 0 other vulnerabilities. |
|
VCID-vcz9-dvf4-47am
Aliases: CVE-2020-25613 GHSA-gwfg-cqmg-cf8f |
Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code. |
Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2yym-f64y-v7hf | WEBrick Denial of Service Vulnerability httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656. |
CVE-2008-4310
GHSA-wfrc-r6c6-7j9r |