Metrics
Affected Vendors & Products
Mon, 18 Aug 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ruby-lang
Ruby-lang webrick |
|
CPEs | cpe:2.3:a:ruby-lang:webrick:*:*:*:*:*:ruby:*:* | |
Vendors & Products |
Ruby-lang
Ruby-lang webrick |
|
Metrics |
cvssV3_1
|
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 27 Jun 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 25 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Jun 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876. | |
Title | Ruby WEBrick read_header HTTP Request Smuggling Vulnerability | |
Weaknesses | CWE-444 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published: 2025-06-25T16:52:24.625Z
Updated: 2025-06-25T20:42:41.093Z
Reserved: 2025-06-20T17:14:36.566Z
Link: CVE-2025-6442

Updated: 2025-06-25T20:42:37.898Z

Status : Analyzed
Published: 2025-06-25T17:15:40.117
Modified: 2025-08-18T15:49:38.773
Link: CVE-2025-6442
