CVE Vulnerabilities

CVE-2024-47220

Published: Sep 22, 2024 | Modified: Jan 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., GET /admin HTTP/1.1rn inside of a POST /user HTTP/1.1rn request. NOTE: the suppliers position is Webrick should not be used in production.

Affected Software

NameVendorStart VersionEnd Version
RHOL-5.9-RHEL-9RedHatopenshift-logging/cluster-logging-operator-bundle:v5.9.11-25*
RHOL-5.9-RHEL-9RedHatopenshift-logging/cluster-logging-rhel9-operator:v5.9.11-11*
RHOL-5.9-RHEL-9RedHatopenshift-logging/eventrouter-rhel9:v0.4.0-340*
RHOL-5.9-RHEL-9RedHatopenshift-logging/fluentd-rhel9:v5.9.11-5*
RHOL-5.9-RHEL-9RedHatopenshift-logging/log-file-metric-exporter-rhel9:v1.1.0-321*
RHOL-5.9-RHEL-9RedHatopenshift-logging/logging-loki-rhel9:v3.3.2-8*
RHOL-5.9-RHEL-9RedHatopenshift-logging/logging-view-plugin-rhel9:v5.9.11-6*
RHOL-5.9-RHEL-9RedHatopenshift-logging/loki-operator-bundle:v5.9.11-9*
RHOL-5.9-RHEL-9RedHatopenshift-logging/loki-rhel9-operator:v5.9.11-4*
RHOL-5.9-RHEL-9RedHatopenshift-logging/lokistack-gateway-rhel9:v0.1.0-724*
RHOL-5.9-RHEL-9RedHatopenshift-logging/opa-openshift-rhel9:v0.1.0-341*
RHOL-5.9-RHEL-9RedHatopenshift-logging/vector-rhel9:v0.34.1-30*
JrubyUbuntuesm-apps/bionic*
JrubyUbuntuesm-apps/focal*
JrubyUbuntuesm-apps/xenial*
JrubyUbuntuesm-infra-legacy/trusty*
Ruby-webrickUbuntudevel*
Ruby-webrickUbuntujammy*
Ruby-webrickUbuntunoble*
Ruby-webrickUbuntuoracular*
Ruby-webrickUbuntuplucky*
Ruby-webrickUbuntuquesting*
Ruby2.3Ubuntuesm-infra/xenial*
Ruby2.5Ubuntuesm-infra/bionic*
Ruby2.7Ubuntuesm-infra/focal*

References