Puma header normalization allows clients to clobber proxy set headers resulting in potential security vulnerabilities and confidentiality leaks if combined with MITM attack. Patch v6.4.3/v5.6.9 discards headers using underscores, allowing proxy defined headers to always win
Reporter | Title | Published | Views | Family All 34 |
---|---|---|---|---|
![]() | CVE-2024-45614 | 19 Sep 202423:15 | – | debiancve |
![]() | Ubuntu: Security Advisory (USN-7031-2) | 25 Sep 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7031-1) | 25 Sep 202400:00 | – | openvas |
![]() | openSUSE: Security Advisory for rubygem (SUSE-SU-2024:3644-1) | 17 Oct 202400:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-3947-1) | 6 Nov 202400:00 | – | openvas |
![]() | CVE-2024-45614 | 20 Sep 202400:00 | – | ubuntucve |
![]() | CVE-2024-45614 Header normalization allows for client to clobber proxy set headers in Puma | 19 Sep 202422:42 | – | vulnrichment |
![]() | CVE-2024-45614 | 19 Sep 202423:15 | – | nvd |
![]() | Exploit for HTTP Request Smuggling in Puma | 28 Sep 202406:29 | – | githubexploit |
![]() | ruby3.3-rubygem-puma-6.4.3-1.1 on GA media | 7 Nov 202400:00 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo