Ruby-lang Webrick 1.3.1 for Ruby

CPE Details

Ruby-lang Webrick 1.3.1 for Ruby
1.3.1
2023-08-01
16h48 +00:00
2023-08-05
00h58 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:ruby-lang:webrick:1.3.1:*:*:*:*:ruby:*:*

Informations

Vendor

ruby-lang

Product

webrick

Version

1.3.1

Target Software

ruby

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-25613 2020-10-05 22h00 +00:00 An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
7.5
Haute
CVE-2009-4492 2010-01-13 19h00 +00:00 WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
7.5