Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions.
The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876.
References
Configurations
History
18 Aug 2025, 15:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ruby/webrick/commit/ee60354bcb84ec33b9245e1d1aa6e1f7e8132101#diff-ad02984d873efb089aa51551bc6b7d307a53e0ba1ac439e91d69c2e58a478864 - Patch | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-414/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
CPE | cpe:2.3:a:ruby-lang:webrick:*:*:*:*:*:ruby:*:* | |
First Time |
Ruby-lang webrick
Ruby-lang |
26 Jun 2025, 18:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Jun 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-25 17:15
Updated : 2025-08-18 15:49
NVD link : CVE-2025-6442
Mitre link : CVE-2025-6442
CVE.ORG link : CVE-2025-6442
JSON object : View
Products Affected
ruby-lang
- webrick
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')