Ruby-Lang Webrick vulnerabilities

7 known vulnerabilities affecting ruby-lang/webrick.

Total CVEs
7
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2025-6442MEDIUMCVSS 5.9fixed in 1.8.22025-06-25
CVE-2025-6442 [MEDIUM] CWE-444 CVE-2025-6442: Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote atta Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method.
ghsanvdosv
CVE-2024-47220HIGH≥ 0, < 1.8.22024-09-22
CVE-2024-47220 [HIGH] CWE-444 HTTP Request Smuggling in ruby webrick HTTP Request Smuggling in ruby webrick An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
ghsaosv
CVE-2017-10784HIGH≥ 0, < 1.4.02022-05-14
CVE-2017-10784 [HIGH] CWE-287 WEBrick RCE Vulnerability WEBrick RCE Vulnerability The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
ghsaosv
CVE-2008-4310HIGHCVSS 7.8PoC≥ 0, < 1.3.12022-05-02
CVE-2008-4310 [HIGH] CWE-400 WEBrick Denial of Service Vulnerability WEBrick Denial of Service Vulnerability httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.
ghsaosv
CVE-2020-25613HIGHCVSS 7.5≤ 1.6.02020-10-06
CVE-2020-25613 [HIGH] CWE-444 CVE-2020-25613: An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smu
ghsanvdosv
CVE-2019-11879MEDIUMCVSS 5.5v1.4.22019-05-10
CVE-2019-11879 [MEDIUM] CWE-22 CVE-2019-11879: The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to c The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.
nvd
CVE-2009-4492HIGHCVSS 7.5PoCv1.3.12010-01-13
CVE-2009-4492 [HIGH] CVE-2009-4492: WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 th WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an e
ghsanvdosv