First published: Wed Mar 30 2022(Updated: )
A HTTP request smuggling flaw was found in puma. This issue occurs when using puma behind a proxy. Puma does not validate incoming HTTP requests, as per RFC specification, leading to loss of integrity.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rubygem-puma | <0:4.3.12-1.el7 | 0:4.3.12-1.el7 |
redhat/tfm-rubygem-puma | <0:4.3.12-1.el7 | 0:4.3.12-1.el7 |
Puma Puma | <4.3.12 | |
Puma Puma | >=5.0.0<5.6.4 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
redhat/puma | <5.6.4 | 5.6.4 |
redhat/puma | <4.3.12 | 4.3.12 |
ubuntu/puma | <3.12.4-1ubuntu2+ | 3.12.4-1ubuntu2+ |
ubuntu/puma | <5.5.2-2ubuntu2+ | 5.5.2-2ubuntu2+ |
debian/puma | <=3.12.0-2+deb10u2<=4.3.8-1 | 3.12.0-2+deb10u3 4.3.8-1+deb11u2 5.6.5-3 6.4.2-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24790 is a HTTP request smuggling flaw found in Puma, a multi-threaded HTTP server for Ruby/Rack applications.
CVE-2022-24790 has a severity rating of 7.5 (Critical).
The affected software includes Puma versions up to and including 5.6.4 and Rubygem Puma up to and including version 4.3.12.
To fix CVE-2022-24790, update to Puma version 5.6.5 or higher, or Rubygem Puma version 4.3.13 or higher.
More information about CVE-2022-24790 can be found at the following references: [GitHub Commit](https://github.com/puma/puma/commit/5bb7d202e24dec00a898dca4aa11db391d7787a5), [GitHub Security Advisory](https://github.com/puma/puma/security/advisories/GHSA-h99w-9q5r-gjq9), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2071623).