Lucene search

K
githubGitHub Advisory DatabaseGHSA-C2F4-CVQM-65W2
HistoryJan 08, 2024 - 3:56 p.m.

Puma HTTP Request/Response Smuggling vulnerability

2024-01-0815:56:48
CWE-444
GitHub Advisory Database
github.com
21
http request smuggling
puma
vulnerability
fixed
chunked transfer encoding
security policy

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

12.6%

Impact

Prior to versions 6.4.2 and 5.6.8, puma exhibited dangerous behavior when parsing chunked transfer encoding bodies.

Fixed versions limit the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption.

Patches

The vulnerability has been fixed in 6.4.2 and 5.6.8.

Workarounds

No known workarounds.

References

Affected configurations

Vulners
Node
pumapumaRange<5.6.8
OR
pumapumaRange<6.4.2
CPENameOperatorVersion
pumalt5.6.8
pumalt6.4.2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

12.6%