[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2RUBY2.6-2023-006 --- ruby

ID: oval:org.secpod.oval:def:1701799Date: (C)2023-10-26   (M)2024-01-29
Class: PATCHFamily: unix




An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy , which may lead to an HTTP Request Smuggling attack. A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again

Platform:
Amazon Linux 2
Product:
ruby
rubygem-bigdecimal
rubygem-bundler
rubygem-did_you_mean
rubygem-io-console
rubygem-irb
rubygem-json
rubygem-minitest
rubygem-net-telnet
rubygem-openssl
rubygem-power_assert
rubygem-psych
rubygem-rdoc
rubygem-test-unit
rubygem-xmlrpc
rubygems
rubygem-rake
Reference:
ALAS2RUBY2.6-2023-006
CVE-2020-25613
CVE-2021-28965
CVE    2
CVE-2021-28965
CVE-2020-25613
CPE    6
cpe:/a:rubygem:rubygem-json
cpe:/a:rubygems:rubygem-rake
cpe:/a:gembundler:rubygem-bundler
cpe:/a:ruby:ruby
...

© SecPod Technologies