Fix HTTParty — CVE-2024-22049 HIGH

Fix CVE-2024-22049 (HIGH) in HTTParty for Ruby. Paste your Gemfile into PackageFix and get a patched version — no CLI, no signup. Ssrf via crafted uri in redirect following.

⚠ Vulnerability

CVE-2024-22049 (HIGH) — SSRF via crafted URI in redirect following in HTTParty versions below 0.21.0.

Vulnerable Version — Gemfile

gem 'httparty', '0.20.0'

Fixed Version — Gemfile

gem 'httparty', '0.21.0'
✓ Fix

Update HTTParty to 0.21.0 or later. Run bundle install to apply. Verify with your ecosystem's audit tool after updating.

Paste your manifest — get back a fixed version with all CVEs patched in seconds.

Open PackageFix →

No signup · No CLI · No GitHub connection · Runs 100% in your browser

CVE Details

FieldValue
CVE IDCVE-2024-22049
SeverityHIGH
PackageHTTParty (Ruby)
Vulnerable versionsBelow 0.21.0
Safe version0.21.0
CISA KEV
DescriptionSsrf via crafted uri in redirect following

Frequently Asked Questions

What is CVE-2024-22049?
CVE-2024-22049 is a HIGH severity vulnerability in HTTParty (Ruby). It allows SSRF via crafted URI in redirect following. Update to version 0.21.0 or later to fix it.
How do I fix CVE-2024-22049 in HTTParty?
Update HTTParty to version 0.21.0 in your Gemfile. Run bundle install after updating to apply the fix.
Is CVE-2024-22049 being actively exploited?
Check the live CISA KEV catalog at packagefix.dev — PackageFix always reflects the current KEV status.
How do I check if I am affected by CVE-2024-22049?
Paste your Gemfile into PackageFix. If your installed version of HTTParty is below 0.21.0, you are affected. PackageFix shows the exact CVE ID and fix version.
What search queries does this page target?
This page covers: HTTParty CVE, httparty SSRF, httparty vulnerability.

Related Guides