CVE-2024-45614
- EPSS 0.07%
- Veröffentlicht 19.09.2024 23:15:11
- Zuletzt bearbeitet 26.09.2024 13:28:30
Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on...
CVE-2024-21647
- EPSS 1.65%
- Veröffentlicht 08.01.2024 14:15:47
- Zuletzt bearbeitet 21.11.2024 08:54:47
Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the siz...
CVE-2023-40175
- EPSS 0.4%
- Veröffentlicht 18.08.2023 22:15:11
- Zuletzt bearbeitet 21.11.2024 08:18:55
Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggli...
CVE-2022-24790
- EPSS 0.51%
- Veröffentlicht 30.03.2022 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:51:06
Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for Ruby/Rack applications. When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may d...
CVE-2022-23634
- EPSS 0.44%
- Veröffentlicht 11.02.2022 22:15:07
- Zuletzt bearbeitet 21.11.2024 06:48:58
Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAtt...
CVE-2021-41136
- EPSS 0.27%
- Veröffentlicht 12.10.2021 16:15:07
- Zuletzt bearbeitet 27.05.2025 16:15:21
Puma is a HTTP 1.1 server for Ruby/Rack applications. Prior to versions 5.5.1 and 4.3.9, using `puma` with a proxy which forwards HTTP header values which contain the LF character could allow HTTP request smugggling. A client could smuggle a request ...
CVE-2021-29509
- EPSS 1.36%
- Veröffentlicht 11.05.2021 17:15:07
- Zuletzt bearbeitet 21.11.2024 06:01:16
Puma is a concurrent HTTP 1.1 server for Ruby/Rack applications. The fix for CVE-2019-16770 was incomplete. The original fix only protected existing connections that had already been accepted from having their requests starved by greedy persistent-co...
CVE-2020-11076
- EPSS 1.37%
- Veröffentlicht 22.05.2020 15:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:44
In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
CVE-2020-11077
- EPSS 0.82%
- Veröffentlicht 22.05.2020 15:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:44
In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP...
CVE-2020-5249
- EPSS 0.5%
- Veröffentlicht 02.03.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:33:45
In Puma (RubyGem) before 4.3.3 and 3.12.4, if an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an ...