Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9hf4-67fc-4vf4

Опубликовано: 20 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.3
CVSS3: 5.4

Описание

Puma's header normalization allows for client to clobber proxy set headers

Impact

Clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users trusting headers set by their proxy may be affected. Attackers may be able to downgrade connections to HTTP (non-SSL) or redirect responses, which could cause confidentiality leaks if combined with a separate MITM attack.

Patches

v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win.

Workarounds

Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level.

Any users that are implicitly trusting the proxy defined headers for security or availability should immediately cease doing so until upgraded to the fixed versions.

Пакеты

Наименование

puma

rubygems
Затронутые версииВерсия исправления

< 5.6.9

5.6.9

Наименование

puma

rubygems
Затронутые версииВерсия исправления

>= 6.0.0, < 6.4.3

6.4.3

EPSS

Процентиль: 18%
0.00057
Низкий

6.3 Medium

CVSS4

5.4 Medium

CVSS3

Дефекты

CWE-444
CWE-639

Связанные уязвимости

CVSS3: 5.4
ubuntu
9 месяцев назад

Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on proxy set variables is affected. v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win. Users are advised to upgrade. Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level as a mitigation. Any users that are implicitly trusting the proxy defined headers for security should immediately cease doing so until upgraded to the fixed versions.

CVSS3: 5.4
redhat
9 месяцев назад

Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on proxy set variables is affected. v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win. Users are advised to upgrade. Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level as a mitigation. Any users that are implicitly trusting the proxy defined headers for security should immediately cease doing so until upgraded to the fixed versions.

CVSS3: 5.4
nvd
9 месяцев назад

Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on proxy set variables is affected. v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win. Users are advised to upgrade. Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level as a mitigation. Any users that are implicitly trusting the proxy defined headers for security should immediately cease doing so until upgraded to the fixed versions.

CVSS3: 5.4
debian
9 месяцев назад

Puma is a Ruby/Rack web server built for parallelism. In affected vers ...

CVSS3: 5.4
fstec
9 месяцев назад

Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 18%
0.00057
Низкий

6.3 Medium

CVSS4

5.4 Medium

CVSS3

Дефекты

CWE-444
CWE-639