logo

CVE-2025-6442 webrick

Package

Manager: gem
Name: webrick
Vulnerable Version: >=0 <1.8.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00054 pctl0.16648

Details

Ruby WEBrick read_headers method can lead to HTTP Request/Response Smuggling Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876.

Metadata

Created: 2025-06-26T21:31:13Z
Modified: 2025-06-30T12:53:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-r995-q44h-hr64/GHSA-r995-q44h-hr64.json
CWE IDs: ["CWE-444"]
Alternative ID: GHSA-r995-q44h-hr64
Finding: F110
Auto approve: 1