webrick 1.6.1

2 security vulnerabilities found in version 1.6.1

HTTP Request Smuggling in ruby webrick

high severity CVE-2024-47220
high severity CVE-2024-47220
Patched versions: >= 1.8.2

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request.

NOTE: the supplier''s position is "Webrick should not be used in production."

Ruby WEBrick read_headers method can lead to HTTP Request/Response Smuggling

medium severity CVE-2025-6442
medium severity CVE-2025-6442
Patched versions: >= 1.8.2

Ruby WEBrick read_header HTTP Request Smuggling Vulnerability

This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions.

The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.