CVE-2011-3624
Severity CVSS v4.0:
Pending analysis
Type:
CWE-74
Injection
Publication date:
26/11/2019
Last modified:
21/11/2024
Description
Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/security/cve/cve-2011-3624
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3624
- https://redmine.ruby-lang.org/issues/5418
- https://security-tracker.debian.org/tracker/CVE-2011-3624
- https://access.redhat.com/security/cve/cve-2011-3624
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3624
- https://redmine.ruby-lang.org/issues/5418
- https://security-tracker.debian.org/tracker/CVE-2011-3624



