CVE-2024-47220

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
Configurations

No configuration.

History

25 Sep 2024, 15:15

Type Values Removed Values Added
References
  • () https://github.com/ruby/webrick/issues/145#issuecomment-2372838285 -

25 Sep 2024, 06:15

Type Values Removed Values Added
References
  • () https://github.com/ruby/webrick/issues/145#issuecomment-2369994610 -

23 Sep 2024, 15:35

Type Values Removed Values Added
Summary
  • (es) Se descubrió un problema en el kit de herramientas WEBrick a través de la versión 1.8.1 para Ruby. Permite el contrabando de solicitudes HTTP al proporcionar un encabezado Content-Length y un encabezado Transfer-Encoding, por ejemplo, "GET /admin HTTP/1.1\r\n" dentro de una solicitud "POST /user HTTP/1.1\r\n". NOTA: la posición del proveedor es "Webrick no debe usarse en producción".
CWE CWE-444
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

22 Sep 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-22 01:15

Updated : 2024-09-26 13:32


NVD link : CVE-2024-47220

Mitre link : CVE-2024-47220

CVE.ORG link : CVE-2024-47220


JSON object : View

Products Affected

No product.

CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')