Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1nd2ZnLWNxbWctY2Y4Zs4AAmJ3

WEBRick vulnerable to HTTP Request/Response Smuggling

An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.

Permalink: https://github.com/advisories/GHSA-gwfg-cqmg-cf8f
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nd2ZnLWNxbWctY2Y4Zs4AAmJ3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 6 days ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Identifiers: GHSA-gwfg-cqmg-cf8f, CVE-2020-25613
References: Repository: https://github.com/ruby/webrick
Blast Radius: 35.0

Affected Packages

rubygems:webrick
Dependent packages: 368
Dependent repositories: 46,333
Downloads: 222,371,739 total
Affected Version Ranges: < 1.6.1
Fixed in: 1.6.1
All affected versions: 1.3.1, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.5.0, 1.5.1, 1.6.0
All unaffected versions: 1.6.1, 1.7.0, 1.8.0, 1.8.1