Search for packages
| purl | pkg:gem/webrick@1.4.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3wgz-s6g4-n3fk
Aliases: CVE-2024-47220 GHSA-6f62-3596-g6w7 |
HTTP Request Smuggling in ruby webrick An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production." |
Affected by 0 other vulnerabilities. |
|
VCID-pay9-phaz-bbde
Aliases: CVE-2025-6442 GHSA-r995-q44h-hr64 |
Ruby WEBrick read_headers method can lead to HTTP Request/Response Smuggling Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-vcz9-dvf4-47am | Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code. |
CVE-2020-25613
GHSA-gwfg-cqmg-cf8f |