QID 356195

Date Published: 2023-09-28

QID 356195: Amazon Linux Security Advisory for ruby : ALASRUBY2.6-2023-006

An issue was discovered in ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1.
Webrick, a simple http server bundled with ruby, had not checked the transfer-encoding header value rigorously.
An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an http request smuggling attack. (
( CVE-2020-25613) a flaw was found in the way the ruby rexml library parsed xml documents.
Parsing a specially crafted xml document using rexml and writing parsed data back to a new xml document results in creating a document with a different structure.
This issue could affect the integrity of processed data in applications using rexml that parse xml documents, write data back to xml, and re-parse them again. (
( CVE-2021-28965)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Please refer to Amazon advisory: ALASRUBY2.6-2023-006 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356195

    Software Advisories
    Advisory ID Software Component Link
    ALASRUBY2.6-2023-006 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASRUBY2.6-2023-006.html