First published: Sun Sep 22 2024(Updated: )
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
Affected Software | Affected Version | How to fix |
---|---|---|
WEBrick | <=1.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2314051 is considered high due to its potential for HTTP request smuggling.
To mitigate REDHAT-BUG-2314051, upgrade Ruby WEBrick to a version higher than 1.8.1.
WEBrick versions up to and including 1.8.1 are affected by REDHAT-BUG-2314051.
REDHAT-BUG-2314051 facilitates HTTP request smuggling attacks.
A temporary workaround for REDHAT-BUG-2314051 can involve disabling HTTP request smuggling techniques by reviewing request headers.