Vulnerability Description
Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Ruby | 1.8.7 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/cve-2011-3624Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3624Issue TrackingThird Party Advisory
- https://redmine.ruby-lang.org/issues/5418
- https://security-tracker.debian.org/tracker/CVE-2011-3624Third Party Advisory
- https://access.redhat.com/security/cve/cve-2011-3624Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3624Issue TrackingThird Party Advisory
- https://redmine.ruby-lang.org/issues/5418
- https://security-tracker.debian.org/tracker/CVE-2011-3624Third Party Advisory
FAQ
What is CVE-2011-3624?
CVE-2011-3624 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote a...
How severe is CVE-2011-3624?
CVE-2011-3624 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3624?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Ruby.