Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in puma
Published: August 18, 2023
SECURITY IDENTIFIERS
- GHSA: GHSA-68xg-gqqm-vgj8
- Vendor Advisory: https://github.com/puma/puma/security/advisories/GHSA-68xg-gqqm-vgj8
GEM
SEVERITY
CVSS v3.x: 6.5 (Medium)
PATCHED VERSIONS
~> 5.6.7
>= 6.3.1
DESCRIPTION
Impact
Prior to version 6.3.1, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling.
The following vulnerabilities are addressed by this advisory:
- Incorrect parsing of trailing fields in chunked transfer encoding bodies
- Parsing of blank/zero-length Content-Length headers
\r\n
Patches
The vulnerability has been fixed in 6.3.1 and 5.6.7.
Workarounds
No known workarounds.
