Description
reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks. Note: This project is deprecated, and is not maintained any more.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1225 | reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks. Note: This project is deprecated, and is not maintained any more. |
Github GHSA |
GHSA-x3v4-pxvm-63j8 | HTTP Request Smuggling in reel |
References
| Link | Providers |
|---|---|
| https://snyk.io/vuln/SNYK-RUBY-REEL-569135 |
|
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T09:33:20.010Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7659
No data.
Status : Modified
Published: 2020-06-01T13:15:10.313
Modified: 2024-11-21T05:37:33.470
Link: CVE-2020-7659
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA