NA

CVE-2024-21647

Published: 08/01/2024 Updated: 11/01/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. This vulnerability has been fixed in versions 6.4.2 and 5.6.8.

Vulnerable Product Search on Vulmon Subscribe to Product

puma puma

Vendor Advisories

Debian Bug report logs - #1060345 puma: CVE-2024-21647: Invalid parsing of chunked encoding in HTTP/11 allows DoS attacks Package: src:puma; Maintainer for src:puma is Debian Ruby Team <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 9 Jan 2024 2 ...
Description<!---->A flaw was found in Puma rubygem Versions prior 642 are susceptible to a HTTP smuggling attack when parsing chunked transfer encoding bodies on HTTP messages, which don't limit the size of the message chunk extensions This issue may lead to uncontrolled resource consumption, possibly resulting in a denial of service of the att ...