commit by to_remotes 2024-09-26 11:32:46 +0200 from cicd
parent
dde76751f3
commit
555771be11
|
|
@ -1 +1 @@
|
||||||
2024-09-26T11:31:15+02:00
|
2024-09-26T11:32:46+02:00
|
||||||
|
|
|
||||||
|
|
@ -1 +1 @@
|
||||||
{"version":"0.9.2","created_at":"2024-09-26 11:31:14 +0200","results":[]}
|
{"version":"0.9.2","created_at":"2024-09-26 11:32:45 +0200","results":[{"type":"unpatched_gem","gem":{"name":"webrick","version":"1.8.1"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/webrick/CVE-2024-47220.yml","id":"CVE-2024-47220","url":"https://github.com/advisories/GHSA-6f62-3596-g6w7","title":"HTTP Request Smuggling in ruby webrick","date":"2024-09-22","description":"An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby.\nIt allows HTTP request smuggling by providing both a Content-Length\nheader and a Transfer-Encoding header, e.g.,\n\"GET /admin HTTP/1.1\\r\\n\" inside of a \"POST /user HTTP/1.1\\r\\n\"\nrequest.\n\nNOTE: the supplier''s position is \"Webrick should not be used in production.\"\n","cvss_v2":null,"cvss_v3":7.5,"cve":"2024-47220","osvdb":null,"ghsa":"6f62-3596-g6w7","unaffected_versions":[],"patched_versions":[">= 1.8.2"],"criticality":"high"}}]}
|
||||||
11
report.txt
11
report.txt
|
|
@ -1 +1,10 @@
|
||||||
No vulnerabilities found
|
Name: webrick
|
||||||
|
Version: 1.8.1
|
||||||
|
CVE: CVE-2024-47220
|
||||||
|
GHSA: GHSA-6f62-3596-g6w7
|
||||||
|
Criticality: High
|
||||||
|
URL: https://github.com/advisories/GHSA-6f62-3596-g6w7
|
||||||
|
Title: HTTP Request Smuggling in ruby webrick
|
||||||
|
Solution: update to '>= 1.8.2'
|
||||||
|
|
||||||
|
Vulnerabilities found!
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue