WEBRick vulnerable to HTTP Request/Response Smuggling
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated May 30, 2025
Package
Affected versions
= 1.6.0
= 1.5.0
< 1.4.4
Patched versions
1.6.1
1.5.1
1.4.4
Description
Published by the National Vulnerability Database
Oct 6, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Mar 8, 2023
Last updated
May 30, 2025
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
References