HTTP Request Smuggling Affecting logstash package, versions <8.15.2-r1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-LOGSTASH-9292625
  • published6 Mar 2025
  • disclosed19 Sept 2024

Introduced: 19 Sep 2024

CVE-2024-45614  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade Chainguard logstash to version 8.15.2-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream logstash package and not the logstash package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on proxy set variables is affected. v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win. Users are advised to upgrade. Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level as a mitigation. Any users that are implicitly trusting the proxy defined headers for security should immediately cease doing so until upgraded to the fixed versions.

CVSS Base Scores

version 3.1