Ruby-lang Webrick 1.6.0 for Ruby

CPE Details

Ruby-lang Webrick 1.6.0 for Ruby
1.6.0
2020-06-01
13h13 +00:00
2020-06-01
13h13 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:ruby-lang:webrick:1.6.0:*:*:*:*:ruby:*:*

Informations

Vendor

ruby-lang

Product

webrick

Version

1.6.0

Target Software

ruby

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-6442 2025-06-25 16h52 +00:00 Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876.
5.9
Medium
CVE-2020-25613 2020-10-05 22h00 +00:00 An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
7.5
High