CVE-2024-47220
Published Sep 22, 2024
Last updated 2 months ago
- Description
- An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
- CNA Tags
- disputed
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-444
- Hype score
- Not currently trending