First published: Tue Sep 29 2020(Updated: )
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby25-ruby | <0:2.5.9-9.el7 | 0:2.5.9-9.el7 |
redhat/rh-ruby27-ruby | <0:2.7.3-129.el7 | 0:2.7.3-129.el7 |
redhat/rh-ruby26-ruby | <0:2.6.7-119.el7 | 0:2.6.7-119.el7 |
redhat/rubygem-webrick | <1.6.1 | 1.6.1 |
redhat/ruby | <2.5.9 | 2.5.9 |
redhat/ruby | <2.6.7 | 2.6.7 |
redhat/ruby | <2.7.2 | 2.7.2 |
rubygems/webrick | <1.6.1 | 1.6.1 |
Ruby-lang Ruby | <=2.5.8 | |
Ruby-lang Ruby | >=2.6.0<=2.6.6 | |
Ruby-lang Ruby | >=2.7.0<=2.7.1 | |
Ruby-lang Webrick Ruby | <=1.6.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2020-25613 is high.
CVE-2020-25613 affects Ruby versions 2.5.8 through 2.5.9, 2.6.0 through 2.6.6, and 2.7.0 through 2.7.1.
WEBrick is a simple HTTP server bundled with Ruby.
HTTP request smuggling is a vulnerability that allows an attacker to bypass security measures in reverse proxies by sending specially crafted requests that are interpreted differently by the proxy and the server handling the request.
To fix CVE-2020-25613, upgrade Ruby to version 2.5.9, 2.6.7, or 2.7.2, or apply the appropriate patches provided by your distribution.