{"id":"CVE-2024-47220","details":"An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., \"GET /admin HTTP/1.1\\r\\n\" inside of a \"POST /user HTTP/1.1\\r\\n\" request. NOTE: the supplier's position is \"Webrick should not be used in production.\"","aliases":["GHSA-6f62-3596-g6w7"],"modified":"2026-04-16T04:33:01.065468411Z","published":"2024-09-22T01:15:11.950Z","related":["CGA-26g8-c8gp-gjfh","SUSE-SU-2024:3939-1","SUSE-SU-2025:0736-1","SUSE-SU-2025:1369-1","SUSE-SU-2025:4264-1"],"references":[{"type":"WEB","url":"https://github.com/ruby/webrick/pull/146/commits/d88321da45dcd230ac2b4585cad4833d6d5e8841"},{"type":"REPORT","url":"https://github.com/ruby/webrick/issues/145"},{"type":"REPORT","url":"https://github.com/ruby/webrick/issues/145#issuecomment-2369994610"},{"type":"REPORT","url":"https://github.com/ruby/webrick/issues/145#issuecomment-2372838285"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ruby/webrick","events":[{"introduced":"0"},{"last_affected":"158a7ef85337e0e5cdce0c29cb5cb89c7beb9c53"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.8.1"}]}}],"versions":["v1.4.0","v1.4.0.beta1","v1.4.1","v1.4.2","v1.5.0","v1.6.0","v1.7.0","v1.8.0","v1.8.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47220.json"}}],"schema_version":"1.7.5"}