RubySec

Providing security resources for the Ruby community

GHSA-68xg-gqqm-vgj8 (puma): Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in puma

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in puma

Published: August 18, 2023

SECURITY IDENTIFIERS

GEM

puma

SEVERITY

CVSS v3.x: 6.5 (Medium)

PATCHED VERSIONS

~> 5.6.7 >= 6.3.1

DESCRIPTION

Impact

Prior to version 6.3.1, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling.

The following vulnerabilities are addressed by this advisory:

  • Incorrect parsing of trailing fields in chunked transfer encoding bodies
  • Parsing of blank/zero-length Content-Length headers\r\n

Patches

The vulnerability has been fixed in 6.3.1 and 5.6.7.

Workarounds

No known workarounds.

References

HTTP Request Smuggling

RELATED