CVE-2024-47220

EUVD-2024-2733
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
UNKNOWN
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
Debian logo
Debian Releases
Debian Product
Codename
ruby-webrick
bookworm
no-dsa
forky
1.9.1-1
fixed
sid
1.9.1-1
fixed
trixie
1.9.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-webrick
focal
dne
jammy
Fixed 1.7.0-3ubuntu0.1
released
noble
Fixed 1.8.1-1ubuntu0.1
released
oracular
Fixed 1.8.1-1ubuntu1
released
plucky
Fixed 1.8.1-1ubuntu1
released
questing
Fixed 1.8.1-1ubuntu1
released
jruby
bionic
needed
focal
needed
jammy
dne
noble
not-affected
plucky
not-affected
questing
not-affected
trusty
needed
xenial
needed
ruby2.3
jammy
dne
noble
dne
plucky
dne
questing
dne
xenial
Fixed 2.3.1-2~ubuntu16.04.16+esm11
released
ruby2.5
bionic
Fixed 2.5.1-1ubuntu1.16+esm6
released
jammy
dne
noble
dne
plucky
dne
questing
dne
ruby2.7
focal
Fixed 2.7.0-5ubuntu1.18+esm3
released
jammy
dne
noble
dne
plucky
dne
questing
dne