CVE-2024-47220
Publication date 22 September 2024
Last updated 8 October 2024
Ubuntu priority
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
Status
Package | Ubuntu Release | Status |
---|---|---|
ruby-webrick | 24.10 oracular |
Fixed 1.8.1-1ubuntu1
|
24.04 LTS noble |
Fixed 1.8.1-1ubuntu0.1
|
|
22.04 LTS jammy |
Fixed 1.7.0-3ubuntu0.1
|
|
20.04 LTS focal | Not in release |
Notes
References
Related Ubuntu Security Notices (USN)
- USN-7057-1
- WEBrick vulnerability
- 7 October 2024
- USN-7057-2
- WEBrick vulnerability
- 8 October 2024