Ruby-lang

Webrick

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 25.06.2025 16:52:24
  • Zuletzt bearbeitet 18.08.2025 15:49:38

Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an H...

  • EPSS 0.33%
  • Veröffentlicht 06.10.2020 13:15:13
  • Zuletzt bearbeitet 21.11.2024 05:18:14

An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issu...

  • EPSS 0.04%
  • Veröffentlicht 10.05.2019 16:29:01
  • Zuletzt bearbeitet 21.11.2024 04:21:56

The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apach...

Exploit
  • EPSS 10.66%
  • Veröffentlicht 13.01.2010 20:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify...

Exploit
  • EPSS 72.77%
  • Veröffentlicht 04.03.2008 23:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access a...