​
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-vpxm-6rw3-pvp7

Published

Last updated

https://images.chainguard.dev/security/CGA-vpxm-6rw3-pvp7
Package

ruby3.2-webrick

Latest Update
Fixed
Fixed Version

1.8.2-r0

Aliases
  • CVE-2024-47220
  • GHSA-6f62-3596-g6w7

Severity

7.5

High

CVSS V3

Summary

HTTP Request Smuggling in ruby webrick

Description

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images