CVE-2011-3624 (retired)

Various methods in WEBrick::HTTPRequest in Ruby 1.9.2-p290 and
1.8.7-p352 and earlier and do not validate the X-Forwarded-For,
X-Forwarded-Host and X-Forwarded-Server headers in requests, which might
allow remote attackers to inject arbitrary text into log files or bypass
intended address parsing via a crafted header.
 tyhicks> Upstream is still unpatched
 mdeslaur> still no upstream fix as of 2019-04-10
Upstream:not-affected (1.9.3~rc1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was deferred [2019-04-10])
Trusty/esm:DNE (trusty was deferred [2019-04-10])
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
More Information

Updated: 2019-04-26 14:33:02 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)