CVE-2020-7659

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-7659
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-7659.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-7659
Aliases
Related
Published
2020-06-01T13:15:10Z
Modified
2024-09-03T03:42:09.075172Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks. Note: This project is deprecated, and is not maintained any more.

References

Affected packages

Git / github.com/celluloid/reel

Affected ranges

Type
GIT
Repo
https://github.com/celluloid/reel
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*

v0.0.1
v0.0.2
v0.1.0
v0.2.0
v0.2.0.pre
v0.3.0
v0.3.0.pre
v0.4.0
v0.4.0.pre
v0.4.0.pre2
v0.4.0.pre3
v0.4.0.pre4
v0.4.0.pre5
v0.4.0.pre6
v0.4.0.pre7
v0.5.0
v0.5.0.pre
v0.6.0
v0.6.1