Puma

Puma

12 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 19.09.2024 23:15:11
  • Last modified 26.09.2024 13:28:30

Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on...

  • EPSS 1.65%
  • Published 08.01.2024 14:15:47
  • Last modified 21.11.2024 08:54:47

Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the siz...

  • EPSS 0.4%
  • Published 18.08.2023 22:15:11
  • Last modified 21.11.2024 08:18:55

Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggli...

  • EPSS 0.51%
  • Published 30.03.2022 22:15:08
  • Last modified 21.11.2024 06:51:06

Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for Ruby/Rack applications. When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may d...

  • EPSS 0.44%
  • Published 11.02.2022 22:15:07
  • Last modified 21.11.2024 06:48:58

Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAtt...

  • EPSS 0.27%
  • Published 12.10.2021 16:15:07
  • Last modified 27.05.2025 16:15:21

Puma is a HTTP 1.1 server for Ruby/Rack applications. Prior to versions 5.5.1 and 4.3.9, using `puma` with a proxy which forwards HTTP header values which contain the LF character could allow HTTP request smugggling. A client could smuggle a request ...

  • EPSS 1.36%
  • Published 11.05.2021 17:15:07
  • Last modified 21.11.2024 06:01:16

Puma is a concurrent HTTP 1.1 server for Ruby/Rack applications. The fix for CVE-2019-16770 was incomplete. The original fix only protected existing connections that had already been accepted from having their requests starved by greedy persistent-co...

  • EPSS 1.37%
  • Published 22.05.2020 15:15:11
  • Last modified 21.11.2024 04:56:44

In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.

  • EPSS 0.82%
  • Published 22.05.2020 15:15:11
  • Last modified 21.11.2024 04:56:44

In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP...

  • EPSS 0.5%
  • Published 02.03.2020 16:15:12
  • Last modified 21.11.2024 05:33:45

In Puma (RubyGem) before 4.3.3 and 3.12.4, if an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an ...