The Debian 'puma' package in Debian 9 is affected by multiple vulnerabilities including HTTP request smuggling
Reporter | Title | Published | Views | Family All 59 |
---|---|---|---|---|
Tenable Nessus | openSUSE Security Update : rubygem-puma (openSUSE-2020-1001) | 20 Jul 202000:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : rubygem-puma (openSUSE-2020-990) | 20 Jul 202000:00 | – | nessus |
Tenable Nessus | Debian DLA-2398-1 : puma security update | 8 Oct 202000:00 | – | nessus |
Tenable Nessus | Ubuntu 20.04 LTS / 22.04 LTS : Puma vulnerabilities (USN-6682-1) | 7 Mar 202400:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : rmt-server (openSUSE-2020-2000) | 24 Nov 202000:00 | – | nessus |
Tenable Nessus | SUSE SLES15 Security Update : rmt-server (SUSE-SU-2020:3036-1) | 9 Dec 202000:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : rmt-server (openSUSE-2020-1993) | 23 Nov 202000:00 | – | nessus |
Tenable Nessus | SUSE SLES15 Security Update : rmt-server (SUSE-SU-2020:3147-1) | 9 Dec 202000:00 | – | nessus |
Tenable Nessus | SUSE SLES15 Security Update : rmt-server (SUSE-SU-2020:3160-1) | 9 Dec 202000:00 | – | nessus |
Debian | [SECURITY] [DLA 2398-1] puma security update | 7 Oct 202011:06 | – | debian |
Source | Link |
---|---|
wiki | www.wiki.debian.org/LTS |
security-tracker | www.security-tracker.debian.org/tracker/puma |
debian | www.debian.org/lts/security/2020/DLA-2398-1 |
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.892398");
script_cve_id("CVE-2020-11076", "CVE-2020-11077");
script_tag(name:"creation_date", value:"2020-10-08 03:00:14 +0000 (Thu, 08 Oct 2020)");
script_version("2024-02-02T05:06:07+0000");
script_tag(name:"last_modification", value:"2024-02-02 05:06:07 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-05-28 16:46:15 +0000 (Thu, 28 May 2020)");
script_name("Debian: Security Advisory (DLA-2398-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone AG");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB9");
script_xref(name:"Advisory-ID", value:"DLA-2398-1");
script_xref(name:"URL", value:"https://www.debian.org/lts/security/2020/DLA-2398-1");
script_xref(name:"URL", value:"https://security-tracker.debian.org/tracker/puma");
script_xref(name:"URL", value:"https://wiki.debian.org/LTS");
script_tag(name:"summary", value:"The remote host is missing an update for the Debian 'puma' package(s) announced via the DLA-2398-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Several security vulnerabilities have been discovered in puma, highly concurrent HTTP server for Ruby/Rack applications.
CVE-2020-11076
By using an invalid transfer-encoding header, an attacker could smuggle an HTTP response.
CVE-2020-11077
client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
For Debian 9 stretch, this problem has been fixed in version 3.6.0-1+deb9u1.
We recommend that you upgrade your puma packages.
For the detailed security status of puma please refer to its security tracker page at: [link moved to references]
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]");
script_tag(name:"affected", value:"'puma' package(s) on Debian 9.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "DEB9") {
if(!isnull(res = isdpkgvuln(pkg:"puma", ver:"3.6.0-1+deb9u1", rls:"DEB9"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo