Lucene search

K
cve[email protected]CVE-2022-23634
HistoryFeb 11, 2022 - 10:15 p.m.

CVE-2022-23634

2022-02-1122:15:07
CWE-404
CWE-200
web.nvd.nist.gov
235
5
puma
ruby
rack
web server
parallelism
cve-2022-23634
rails
information leakage
vulnerability
nvd.

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

5.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.7%

Puma is a Ruby/Rack web server built for parallelism. Prior to puma version 5.6.2, puma may not always call close on the response body. Rails, prior to version 7.0.2.2, depended on the response body being closed in order for its CurrentAttributes implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails’ Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails or Puma version fixes the vulnerability.

Affected configurations

Vulners
NVD
Node
pumapumaRange5.0.05.6.2
OR
pumapumaRange<4.3.11
VendorProductVersionCPE
pumapuma*cpe:2.3:a:puma:puma:*:*:*:*:*:*:*:*
pumapuma*cpe:2.3:a:puma:puma:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "puma",
    "vendor": "puma",
    "versions": [
      {
        "status": "affected",
        "version": ">= 5.0.0, < 5.6.2"
      },
      {
        "status": "affected",
        "version": "< 4.3.11"
      }
    ]
  }
]

References

Social References

More

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

5.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.7%