First published: Fri May 22 2020(Updated: )
### Impact By using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling) Originally reported by @ZeddYu, who has our thanks for the detailed report. ### Patches The problem has been fixed in Puma 3.12.5 and Puma 4.3.4. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/puma | >=4.0.0<4.3.4 | 4.3.4 |
rubygems/puma | <3.12.5 | 3.12.5 |
Puma Puma | >=3.0.0<3.12.6 | |
Puma Puma | >=4.0.0<4.3.5 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
ubuntu/puma | <3.12.4-1ubuntu2+ | 3.12.4-1ubuntu2+ |
debian/puma | 3.12.0-2+deb10u2 3.12.0-2+deb10u3 4.3.8-1 4.3.8-1+deb11u2 5.6.5-3 6.4.2-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-11076.
The severity of CVE-2020-11076 is high, with a severity value of 7.5.
An attacker can exploit CVE-2020-11076 by using an invalid transfer-encoding header to smuggle an HTTP response.
Puma versions 3.0.0 to 3.12.5 and 4.0.0 to 4.3.4 are affected by CVE-2020-11076.
You can fix CVE-2020-11076 by updating Puma to version 3.12.5 or 4.3.4, depending on the version you are currently using.