Ruby WEBrick < 1.8.2 HTTP Request Smuggling

medium Nessus Plugin ID 240854

Synopsis

The remote host has an application installed that is affected by an HTTP request smuggling vulnerability

Description

The version of the WEBrick Ruby library installed on the remote host is prior to 1.8.2. It is, therefore, affected by an HTTP request smuggling vulnerability in the read_header. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to WEBrick version 1.8.2 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-25-414/

http://www.nessus.org/u?824008ea

Plugin Details

Severity: Medium

ID: 240854

File Name: ruby_gem_webrick_CVE-2025-6442.nasl

Version: 1.1

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 6/27/2025

Updated: 6/27/2025

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.0

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:C/A:N

CVSS Score Source: CVE-2025-6442

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

Vulnerability Information

CPE: cpe:/a:ruby:webrick

Required KB Items: Host/ruby/modules/enumerated

Patch Publication Date: 6/23/2025

Vulnerability Publication Date: 6/23/2025

Reference Information

CVE: CVE-2025-6442

IAVA: 2025-A-0449

ZDI: ZDI-25-414