Your submission was sent successfully! Close

CVE-2020-25613

Published: 6 October 2020

An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
ruby1.9.1
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

groovy Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

ruby2.0
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

groovy Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

ruby2.3
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

groovy Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

xenial
Released (2.3.1-2~ubuntu16.04.15)
ruby2.5
Launchpad, Ubuntu, Debian
bionic
Released (2.5.1-1ubuntu1.8)
focal Does not exist

groovy Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

ruby2.7
Launchpad, Ubuntu, Debian
bionic Does not exist

focal
Released (2.7.0-5ubuntu1.3)
groovy
Released (2.7.1-3ubuntu1.2)
precise Does not exist

trusty Does not exist

upstream
Released (2.7.1-4)
xenial Does not exist

Patches:
upstream: https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7