An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
References
Configurations
No configuration.
History
25 Sep 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Sep 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Sep 2024, 15:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-444 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
22 Sep 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-22 01:15
Updated : 2024-09-26 13:32
NVD link : CVE-2024-47220
Mitre link : CVE-2024-47220
CVE.ORG link : CVE-2024-47220
JSON object : View
Products Affected
No product.
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')