CVE-2020-25613HTTP Request Smuggling in Webrick

Severity
7.5HIGHNVD
EPSS
0.3%
top 49.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 6
Latest updateMay 24

Description

An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

RubyGemsruby-lang/webrick1.6.01.6.1+2
Debianjruby/jruby< 9.3.9.0+ds-1+2
NVDruby-lang/ruby2.6.02.6.6+2

Also affects: Fedora 32, 33

Patches

🔴Vulnerability Details

5
GHSA
WEBRick vulnerable to HTTP Request/Response Smuggling2022-05-24
OSV
WEBRick vulnerable to HTTP Request/Response Smuggling2022-05-24
OSV
ruby2.3, ruby2.5, ruby2.7 vulnerabilities2021-03-18
CVEList
CVE-2020-25613: An issue was discovered in Ruby through 22020-10-06
OSV
CVE-2020-25613: An issue was discovered in Ruby through 22020-10-06

📋Vendor Advisories

4
Ubuntu
Ruby vulnerabilities2021-03-18
Microsoft
An issue was discovered in Ruby through 2.5.8 2.6.x through 2.6.6 and 2.7.x through 2.7.1. WEBrick a simple HTTP server bundled with Ruby had not checked the transfer-encoding header value rigorously.2020-10-13
Red Hat
ruby: Potential HTTP request smuggling in WEBrick2020-09-29
Debian
CVE-2020-25613: jruby - An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x th...2020

💬Community

2
Bugzilla
CVE-2020-25613 ruby: potential HTTP request smuggling in WEBrick [fedora-all]2020-09-29
Bugzilla
CVE-2020-25613 ruby: Potential HTTP request smuggling in WEBrick2020-09-29
CVE-2020-25613 — HTTP Request Smuggling in Webrick | cvebase