Ruby-lang Webrick 1.4.2

CPE Details

Ruby-lang Webrick 1.4.2
1.4.2
2020-06-01
13h13 +00:00
2020-06-01
13h13 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:ruby-lang:webrick:1.4.2:*:*:*:*:ruby:*:*

Informations

Vendor

ruby-lang

Product

webrick

Version

1.4.2

Target Software

ruby

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-25613 2020-10-05 22h00 +00:00 An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
7.5
High
CVE-2019-11879 2019-05-10 14h00 +00:00 The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.
5.5
Medium