HTTP Request Smuggling Affecting ruby2.5-rubygem-puma package, versions <4.3.5-3.3.1
Threat Intelligence
EPSS
0.54% (78th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES152-RUBY25RUBYGEMPUMA-2708784
- published 14 Apr 2022
- disclosed 15 Jul 2020
Introduced: 15 Jul 2020
CVE-2020-11076 Open this link in a new tabHow to fix?
Upgrade SLES:15.2 ruby2.5-rubygem-puma to version 4.3.5-3.3.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream ruby2.5-rubygem-puma package and not the ruby2.5-rubygem-puma package as distributed by SLES.
See How to fix? for SLES:15.2 relevant fixed versions and status.
In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
References
- https://www.suse.com/security/cve/CVE-2020-11076.html
- https://bugzilla.suse.com/1172175
- https://bugzilla.suse.com/1172176
- https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22
- https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h
- https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/
- https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/
CVSS Scores
version 3.1