CVE-2024-47220

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
UNKNOWN
---
mitreCNA
---
---
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 24%
Debian logo
Debian Releases
Debian Product
Codename
ruby-webrick
bookworm
no-dsa
forky
1.9.1-1
fixed
sid
1.9.1-1
fixed
trixie
1.9.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-webrick
questing
Fixed 1.8.1-1ubuntu1
released
plucky
Fixed 1.8.1-1ubuntu1
released
oracular
Fixed 1.8.1-1ubuntu1
released
noble
Fixed 1.8.1-1ubuntu0.1
released
jammy
Fixed 1.7.0-3ubuntu0.1
released
focal
dne
jruby
questing
not-affected
plucky
not-affected
noble
not-affected
jammy
dne
focal
needed
bionic
needed
xenial
needed
trusty
needed
ruby2.3
questing
dne
plucky
dne
noble
dne
jammy
dne
xenial
Fixed 2.3.1-2~ubuntu16.04.16+esm11
released
ruby2.5
questing
dne
plucky
dne
noble
dne
jammy
dne
bionic
Fixed 2.5.1-1ubuntu1.16+esm6
released
ruby2.7
questing
dne
plucky
dne
noble
dne
jammy
dne
focal
Fixed 2.7.0-5ubuntu1.18+esm3
released