HTTP Request Smuggling

Affecting iodine gem, versions <0.7.39

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

iodine is a fast HTTP / Websocket Server with built-in Pub/Sub support (with or without Redis), static file support and many other features, optimized for Ruby MRI on Linux / BSD / macOS.

Affected versions of this package are vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing.

It could be possible to conduct HTTP request smuggling attacks where iodine is used as part of a chain of backend servers due to insufficient Content-Length and Transfer Encoding parsing.

Remediation

Upgrade iodine to version 0.7.39 or higher.

References

CVSS Score

4.8
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    Low
  • Integrity
    Low
  • Availability
    None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:R
Credit
Snyk Security Team
CWE
CWE-200
Snyk ID
SNYK-RUBY-IODINE-569134
Disclosed
18 May, 2020
Published
08 Jun, 2020