CVE-2024-47220
ADVISORY - githubSummary
An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., "GET /admin HTTP/1.1\r\n" inside of a "POST /user HTTP/1.1\r\n" request. NOTE: the supplier's position is "Webrick should not be used in production."
EPSS Score: 0.00082 (0.247)
Common Weakness Enumeration (CWE)
ADVISORY - nist
ADVISORY - github
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
ADVISORY - gitlab
ADVISORY - redhat
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in