Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-7057-2

Ubuntu Security Notice 7057-2 - USN-7057-1 fixed a vulnerability in WEBrick. This update provides the corresponding updates for Ubuntu 22.04 LTS. It was discovered that WEBrick incorrectly handled having both a Content- Length header and a Transfer-Encoding header. A remote attacker could possibly use this issue to perform a HTTP request smuggling attack.

Packet Storm
#vulnerability#web#ubuntu#ruby

==========================================================================
Ubuntu Security Notice USN-7057-2
October 08, 2024

ruby-webrick vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 22.04 LTS

Summary:

WEBrick could allow a HTTP request smuggling attack.

Software Description:

  • ruby-webrick: HTTP server toolkit in Ruby

Details:

USN-7057-1 fixed a vulnerability in WEBrick. This update provides the
corresponding updates for Ubuntu 22.04 LTS.

Original advisory details:

It was discovered that WEBrick incorrectly handled having both a Content-
Length header and a Transfer-Encoding header. A remote attacker could
possibly use this issue to perform a HTTP request smuggling attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
ruby-webrick 1.7.0-3ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7057-2
https://ubuntu.com/security/notices/USN-7057-1
CVE-2024-47220

Package Information:
https://launchpad.net/ubuntu/+source/ruby-webrick/1.7.0-3ubuntu0.1

Related news

Ubuntu Security Notice USN-7057-1

Ubuntu Security Notice 7057-1 - It was discovered that WEBrick incorrectly handled having both a Content- Length header and a Transfer-Encoding header. A remote attacker could possibly use this issue to perform a HTTP request smuggling attack.

GHSA-6f62-3596-g6w7: HTTP Request Smuggling in ruby webrick

An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution