webrick 1.6.1
HTTP Request Smuggling in ruby webrick
high severity CVE-2024-47220>= 1.8.2
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request.
NOTE: the supplier''s position is "Webrick should not be used in production."
Ruby WEBrick read_headers method can lead to HTTP Request/Response Smuggling
medium severity CVE-2025-6442>= 1.8.2
Ruby WEBrick read_header HTTP Request Smuggling Vulnerability
This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions.
The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876.
No officially reported memory leakage issues detected.
This gem version does not have any officially reported memory leaked issues.
No license issues detected.
This gem version has a license in the gemspec.
This gem version is available.
This gem version has not been yanked and is still available for usage.