Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-24790

Опубликовано: 30 мар. 2022
Источник: redhat
CVSS3: 7.5

Описание

Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for Ruby/Rack applications. When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The vulnerability has been fixed in 5.6.4 and 4.3.12. Users are advised to upgrade as soon as possible. Workaround: when deploying a proxy in front of Puma, turning on any and all functionality to make sure that the request matches the RFC7230 standard.

A HTTP request smuggling flaw was found in puma. This issue occurs when using puma behind a proxy. Puma does not validate incoming HTTP requests, as per RFC specification, leading to loss of integrity.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rubygem-pumaWill not fix
Red Hat Satellite 6tfm-rubygem-puma-plugin-systemdAffected
Red Hat Gluster Storage 3.5 for RHEL 7rubygem-pumaFixedRHSA-2023:148628.03.2023
Red Hat Satellite 6.9 for RHEL 7tfm-rubygem-pumaFixedRHSA-2022:853217.11.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2071616puma-5.6.4: http request smuggling vulnerabilities

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 3 лет назад

Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for Ruby/Rack applications. When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The vulnerability has been fixed in 5.6.4 and 4.3.12. Users are advised to upgrade as soon as possible. Workaround: when deploying a proxy in front of Puma, turning on any and all functionality to make sure that the request matches the RFC7230 standard.

CVSS3: 9.1
nvd
около 3 лет назад

Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for Ruby/Rack applications. When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The vulnerability has been fixed in 5.6.4 and 4.3.12. Users are advised to upgrade as soon as possible. Workaround: when deploying a proxy in front of Puma, turning on any and all functionality to make sure that the request matches the RFC7230 standard.

CVSS3: 9.1
debian
около 3 лет назад

Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for R ...

suse-cvrf
больше 2 лет назад

Security update for rubygem-puma

CVSS3: 9.1
github
около 3 лет назад

Puma vulnerable to HTTP Request Smuggling

7.5 High

CVSS3