An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat logging |
|
CPEs | cpe:/a:redhat:logging:5.9::el9 | |
Vendors & Products |
Redhat
Redhat logging |
Wed, 25 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 25 Sep 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 23 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ruby
Ruby webrick |
|
CPEs | cpe:2.3:a:ruby:webrick:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ruby
Ruby webrick |
|
Metrics |
ssvc
|
Mon, 23 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | WEBrick: HTTP request smuggling | |
Weaknesses | CWE-444 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sun, 22 Sep 2024 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production." | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-09T17:33:17.696Z
Reserved: 2024-09-22T00:00:00
Link: CVE-2024-47220

Updated: 2024-09-23T15:07:20.012Z

Status : Awaiting Analysis
Published: 2024-09-22T01:15:11.950
Modified: 2025-01-09T18:15:28.837
Link: CVE-2024-47220
