Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-23634

Опубликовано: 11 фев. 2022
Источник: redhat
CVSS3: 8

Описание

Puma is a Ruby/Rack web server built for parallelism. Prior to puma version 5.6.2, puma may not always call close on the response body. Rails, prior to version 7.0.2.2, depended on the response body being closed in order for its CurrentAttributes implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails or Puma version fixes the vulnerability.

A flaw was found in Puma and Rails rubygems when response bodies were not closed under certain situations. This flaw allows an attacker, by iterating certain requests, to take advantage of this issue and affect CurrentAttributes, leading to leaked data.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rubygem-pumaWill not fix
CloudForms Management Engine 5rubygem-railsWill not fix
Red Hat Satellite 6tfm-rubygem-railsAffected
Red Hat Storage 3rubygem-pumaNot affected
Red Hat Satellite 6.11 for RHEL 7tfm-rubygem-pumaFixedRHSA-2022:549805.07.2022
Red Hat Satellite 6.11 for RHEL 8rubygem-pumaFixedRHSA-2022:549805.07.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-359
https://bugzilla.redhat.com/show_bug.cgi?id=2054211rubygem-puma: rubygem-rails: information leak between requests

8 High

CVSS3

Связанные уязвимости

CVSS3: 8
ubuntu
больше 3 лет назад

Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability.

CVSS3: 8
nvd
больше 3 лет назад

Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability.

CVSS3: 8
debian
больше 3 лет назад

Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` ...

CVSS3: 8
github
больше 3 лет назад

Puma used with Rails may lead to Information Exposure

CVSS3: 8
fstec
больше 3 лет назад

Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, позволяющая нарушителю получить доступ к конфиденциальной информации

8 High

CVSS3