CVE-2020-25613: Potential HTTP Request Smuggling Vulnerability in WEBrick
Posted by mame on 29 Sep 2020
A potential HTTP request smuggling vulnerability in WEBrick was reported. This vulnerability has been assigned the CVE identifier CVE-2020-25613. We strongly recommend upgrading the webrick gem.
Details
WEBrick was too tolerant against an invalid Transfer-Encoding header. This may lead to inconsistent interpretation between WEBrick and some HTTP proxy servers, which may allow the attacker to “smuggle” a request. See CWE-444 in detail.
Please update the webrick gem to version 1.6.1 or later. You can use gem update webrick to update it. If you are using bundler, please add gem "webrick", ">= 1.6.1" to your Gemfile.
Affected versions
- webrick gem 1.6.0 or prior
- bundled versions of webrick in ruby 2.7.1 or prior
- bundled versions of webrick in ruby 2.6.6 or prior
- bundled versions of webrick in ruby 2.5.8 or prior
Credits
Thanks to piao for discovering this issue.
History
- Originally published at 2020-09-29 06:30:00 (UTC)
Recent News
Ruby 3.2.11 Released
Ruby 3.2.11 has been released. This release includes an update to the zlib gem addressing CVE-2026-27820.
Posted by hsbt on 27 Mar 2026
Ruby 3.3.11 Released
Ruby 3.3.11 has been released. This release includes an update to the zlib gem addressing CVE-2026-27820, along with some bug fixes.
Posted by hsbt on 26 Mar 2026
Ruby 4.0.2 Released
Ruby 4.0.2 has been released.
Posted by k0kubun on 16 Mar 2026
Ruby 3.4.9 Released
Ruby 3.4.9 has been released.
Posted by nagachika on 11 Mar 2026