Описание
Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for Ruby/Rack applications. When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The vulnerability has been fixed in 5.6.4 and 4.3.12. Users are advised to upgrade as soon as possible. Workaround: when deploying a proxy in front of Puma, turning on any and all functionality to make sure that the request matches the RFC7230 standard.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 5.6.5-3ubuntu1 |
esm-apps/focal | released | 3.12.4-1ubuntu2+esm1 |
esm-apps/jammy | released | 5.5.2-2ubuntu2+esm1 |
focal | ignored | end of standard support, was needed |
impish | ignored | end of life |
jammy | needed | |
kinetic | ignored | end of life, was needed |
lunar | not-affected | 5.6.5-3ubuntu1 |
mantic | not-affected | 5.6.5-3ubuntu1 |
noble | not-affected | 5.6.5-3ubuntu1 |
Показывать по
EPSS
5 Medium
CVSS2
9.1 Critical
CVSS3
Связанные уязвимости
Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for Ruby/Rack applications. When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The vulnerability has been fixed in 5.6.4 and 4.3.12. Users are advised to upgrade as soon as possible. Workaround: when deploying a proxy in front of Puma, turning on any and all functionality to make sure that the request matches the RFC7230 standard.
Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for Ruby/Rack applications. When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The vulnerability has been fixed in 5.6.4 and 4.3.12. Users are advised to upgrade as soon as possible. Workaround: when deploying a proxy in front of Puma, turning on any and all functionality to make sure that the request matches the RFC7230 standard.
Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for R ...
EPSS
5 Medium
CVSS2
9.1 Critical
CVSS3