CVE-2020-7659

NameCVE-2020-7659
Descriptionreel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks. Note: This project is deprecated, and is not maintained any more.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
reelsourcestretch(unfixed)end-of-life
reelsource(unstable)(unfixed)

Notes

[stretch] - reel <end-of-life> (Not supported in Stretch LTS)
https://snyk.io/vuln/SNYK-RUBY-REEL-569135

Search for package or bug name: Reporting problems