logo

CVE-2020-25613 webrick

Package

Manager: gem
Name: webrick
Vulnerable Version: =1.6.0 || >=1.6.0 <1.6.1 || =1.5.0 || >=1.5.0 <1.5.1 || >=0 <1.4.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00224 pctl0.44993

Details

WEBRick vulnerable to HTTP Request/Response Smuggling An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.

Metadata

Created: 2022-05-24T17:30:10Z
Modified: 2025-05-29T23:03:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-gwfg-cqmg-cf8f/GHSA-gwfg-cqmg-cf8f.json
CWE IDs: ["CWE-444"]
Alternative ID: GHSA-gwfg-cqmg-cf8f
Finding: F110
Auto approve: 1