Lucene search

K
rubygemsRubySecRUBY:PUMA-2020-5249
HistoryMar 02, 2020 - 9:00 p.m.

HTTP Response Splitting (Early Hints) in Puma

2020-03-0221:00:00
RubySec
rubysec.com
15

Impact

If an application using Puma allows untrusted input in an early-hints header,
an attacker can use a carriage return character to end the header and inject
malicious content, such as additional headers or an entirely new response body.
This vulnerability is known as HTTP Response
Splitting

While not an attack in itself, response splitting is a vector for several other
attacks, such as cross-site scripting (XSS).

This is related to CVE-2020-5247,
which fixed this vulnerability but only for regular responses.

Patches

This has been fixed in 4.3.3 and 3.12.4.

Workarounds

Users can not allow untrusted/user input in the Early Hints response header.

CPENameOperatorVersion
pumale3.12.3
pumage3.13.0
pumalt4.3.3