Lucene search

K
rubygemsRubySecRUBY:PUMA-2024-21647
HistoryJan 07, 2024 - 9:00 p.m.

Puma HTTP Request/Response Smuggling vulnerability

2024-01-0721:00:00
RubySec
github.com
20
puma
http request smuggling
vulnerability
fixed versions

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low

Impact

Prior to versions 6.4.2 and 5.6.8, puma exhibited incorrect
behavior when parsing chunked transfer encoding bodies in a
way that allowed HTTP request smuggling.

Fixed versions limit the size of chunk extensions. Without this
limit, an attacker could cause unbounded resource (CPU, network
bandwidth) consumption.

Patches

The vulnerability has been fixed in 6.4.2 and 5.6.8.

Workarounds

No known workarounds.

References

Affected configurations

Vulners
Node
rubypumaRange5.6.05.6.8
OR
rubypumaRange6.4.2
VendorProductVersionCPE
rubypuma*cpe:2.3:a:ruby:puma:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low