First published: Mon Jan 08 2024(Updated: )
### Impact Prior to versions 6.4.2 and 5.6.8, puma exhibited dangerous behavior when parsing chunked transfer encoding bodies. Fixed versions limit the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. ### Patches The vulnerability has been fixed in 6.4.2 and 5.6.8. ### Workarounds No known workarounds. ### References * [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling) * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/puma | <5.6.8 | 5.6.8 |
rubygems/puma | >=6.0.0<6.4.2 | 6.4.2 |
Puma Puma | <5.6.8 | |
Puma Puma | >=6.0.0<6.4.2 | |
debian/puma | <=3.12.0-2+deb10u2<=3.12.0-2+deb10u3<=4.3.8-1<=4.3.8-1+deb11u2<=5.6.5-3 | 6.4.2-4 |
ubuntu/puma | <3.12.4-1ubuntu2+ | 3.12.4-1ubuntu2+ |
ubuntu/puma | <5.5.2-2ubuntu2+ | 5.5.2-2ubuntu2+ |
ubuntu/puma | <5.6.5-3ubuntu1.2 | 5.6.5-3ubuntu1.2 |
ubuntu/puma | <5.6.5-4ubuntu2.1 | 5.6.5-4ubuntu2.1 |
redhat/puma | <6.4.2 | 6.4.2 |
redhat/puma | <5.6.8 | 5.6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21647 is considered a high severity vulnerability due to the potential for unbounded resource consumption.
To resolve CVE-2024-21647, upgrade to Puma version 5.6.8 or 6.4.2 and later.
CVE-2024-21647 affects versions of Puma prior to 6.4.2 and 5.6.8 across various platforms including Debian, Ubuntu, and Red Hat.
Failing to address CVE-2024-21647 can lead to denial of service conditions due to excessive resource usage.
There are no recommended workarounds for CVE-2024-21647; upgrading is the best solution.