Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions.
The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Jun 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 25 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Jun 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876. | |
Title | Ruby WEBrick read_header HTTP Request Smuggling Vulnerability | |
Weaknesses | CWE-444 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published: 2025-06-25T16:52:24.625Z
Updated: 2025-06-25T20:42:41.093Z
Reserved: 2025-06-20T17:14:36.566Z
Link: CVE-2025-6442

Updated: 2025-06-25T20:42:37.898Z

Status : Awaiting Analysis
Published: 2025-06-25T17:15:40.117
Modified: 2025-06-26T18:57:43.670
Link: CVE-2025-6442
