Skip to content

Commit ad49497

Browse files
author
Sangyong Sim
committed
cp {en,ko}/news/_posts/2020-09-29-http-request-smuggling-cve-2020-25613.md
1 parent 86ee82d commit ad49497

File tree

1 file changed

+32
-0
lines changed

1 file changed

+32
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
layout: news_post
3+
title: "CVE-2020-25613: Potential HTTP Request Smuggling Vulnerability in WEBrick"
4+
author: "mame"
5+
translator:
6+
date: 2020-09-29 06:30:00 +0000
7+
tags: security
8+
lang: en
9+
---
10+
11+
A potential HTTP request smuggling vulnerability in WEBrick was reported. This vulnerability has been assigned the CVE idenfitifer [CVE-2020-25613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25613). We strongly recommend upgrading the webrick gem.
12+
13+
## Details
14+
15+
WEBrick was too tolerant against an invalid Transfer-Encoding header. This may lead to inconsistent interpretation between WEBrick and some HTTP proxy servers, which may allow the attacker to "smuggle" a request. See [CWE-444](https://cwe.mitre.org/data/definitions/444.html) in detail.
16+
17+
Please update the webrick gem to version 1.6.1 or later. You can use `gem update webrick` to update it. If you are using bundler, please add `gem "webrick", ">= 1.6.1"` to your `Gemfile`.
18+
19+
## Affected versions
20+
21+
* webrick gem 1.6.0 or prior
22+
* bundled versions of webrick in ruby 2.7.1 or prior
23+
* bundled versions of webrick in ruby 2.6.6 or prior
24+
* bundled versions of webrick in ruby 2.5.8 or prior
25+
26+
## Credits
27+
28+
Thanks to [piao](https://hackerone.com/piao) for discovering this issue.
29+
30+
## History
31+
32+
* Originally published at 2020-09-29 06:30:00 (UTC)

0 commit comments

Comments
 (0)