reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks. Note: This project is deprecated, and is not maintained any more.
References
Link Resource
https://snyk.io/vuln/SNYK-RUBY-REEL-569135 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: snyk

Published: 2020-06-01T12:50:27

Updated: 2020-06-01T12:50:27

Reserved: 2020-01-21T00:00:00


Link: CVE-2020-7659

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-06-01T13:15:10.313

Modified: 2020-06-02T17:01:51.687


Link: CVE-2020-7659

JSON object: View

cve-icon Redhat Information

No data.

CWE