CVE-2011-3624

NameCVE-2011-3624
DescriptionVarious methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs646020

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby1.8source(unstable)(unfixed)low646020
ruby1.9source(unstable)(unfixed)low646020
ruby1.9.1source(unstable)(unfixed)low646020

Notes

[lenny] - ruby1.8 <no-dsa> (Minor issue)
[squeeze] - ruby1.8 <no-dsa> (Minor issue)
[wheezy] - ruby1.8 <no-dsa> (Minor issue)
[lenny] - ruby1.9 <no-dsa> (Minor issue)
[squeeze] - ruby1.9.1 <no-dsa> (Minor issue, there seems to be no patch upstream)
[wheezy] - ruby1.9.1 <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems