CVE-2025-6442

Name
CVE-2025-6442
Description
Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vendor-advisory https://github.com/ruby/webrick/commit/ee60354bcb84ec33b9245e1d1aa6e1f7e8132101#diff-ad02984d873efb089aa51551bc6b7d307a53e0ba1ac439e91d69c2e58a478864
x_research-advisory https://www.zerodayinitiative.com/advisories/ZDI-25-414/

Match rules

CPE URI Source package Min version Max version
webrick == 1.8.1 == 1.8.1
cpe:2.3:a:ruby-lang:webrick:*:*:*:*:*:ruby:*:* ruby-webrick >= None < 1.8.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
ruby-webrick edge-community 1.8.1-r1 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
ruby-webrick 3.22-community 1.8.1-r1 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable