Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-68xg-gqqm-vgj8

Опубликовано: 18 авг. 2023
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Puma HTTP Request/Response Smuggling vulnerability

Impact

Prior to version 6.3.1, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling.

The following vulnerabilities are addressed by this advisory:

  • Incorrect parsing of trailing fields in chunked transfer encoding bodies
  • Parsing of blank/zero-length Content-Length headers

Patches

The vulnerability has been fixed in 6.3.1 and 5.6.7.

Workarounds

No known workarounds.

References

HTTP Request Smuggling

For more information

If you have any questions or comments about this advisory:

Open an issue in Puma See our security policy

Пакеты

Наименование

puma

rubygems
Затронутые версииВерсия исправления

< 5.6.7

5.6.7

Наименование

puma

rubygems
Затронутые версииВерсия исправления

>= 6.0.0, < 6.3.1

6.3.1

EPSS

Процентиль: 51%
0.00283
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-444

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 2 года назад

Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.3
redhat
почти 2 года назад

Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.3
nvd
почти 2 года назад

Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.3
debian
почти 2 года назад

Puma is a Ruby/Rack web server built for parallelism. Prior to version ...

suse-cvrf
больше 1 года назад

Security update for rubygem-puma

EPSS

Процентиль: 51%
0.00283
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-444