摘要:
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., GET /admin HTTP/1.1 r n inside of a POST /user HTTP/1.1 r n request. NOTE: the supplier s position is Webrick should not be used in production.
安全等级: Low
公告ID: KylinSec-SA-2024-3882
发布日期: 2024年10月9日
关联CVE: CVE-2024-47220
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., GET /admin HTTP/1.1 r n inside of a POST /user HTTP/1.1 r n request. NOTE: the supplier s position is Webrick should not be used in production.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-47220 | KY3.5.2 | ruby | Unaffected |
CVE-2024-47220 | V6 | ruby | Unaffected |