oss-sec mailing list archives
Re: Ruby 1.9.2-p290 WEBrick::HTTPRequest X-Forwarded-*
From: Josh Bressers <bressers () redhat com>
Date: Tue, 18 Oct 2011 16:06:40 -0400 (EDT)
Please use CVE-2011-3624 for this. Thanks. -- JB ----- Original Message -----
Got my Ruby/Ruby on rails mixed up. Various methods in WEBrick::HTTPRequest in Ruby 1.9.2-p290 and 1.8.7-p352 and earlier and do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header. https://redmine.ruby-lang.org/issues/5418 Can we get a CVE for this please? -Kurt Seifried / Red Hat Security Response Team
Current thread:
- Ruby 1.9.2-p290 WEBrick::HTTPRequest X-Forwarded-* Kurt Seifried (Oct 12)
- Re: Ruby 1.9.2-p290 WEBrick::HTTPRequest X-Forwarded-* Matthias Weckbecker (Oct 18)
- Re: Ruby 1.9.2-p290 WEBrick::HTTPRequest X-Forwarded-* Kurt Seifried (Oct 18)
- Re: Ruby 1.9.2-p290 WEBrick::HTTPRequest X-Forwarded-* Josh Bressers (Oct 18)
- Re: Ruby 1.9.2-p290 WEBrick::HTTPRequest X-Forwarded-* Matthias Weckbecker (Oct 18)