WEBRick vulnerable to HTTP Request/Response Smuggling
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Apr 22, 2024
Description
Published by the National Vulnerability Database
Oct 6, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Mar 8, 2023
Last updated
Apr 22, 2024
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
References