CVE-2024-21647

EUVD-2024-0323
Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. This vulnerability has been fixed in versions 6.4.2 and 5.6.8.

HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
Affected Products (NVD)
VendorProductVersion
pumapuma
𝑥
< 5.6.8
pumapuma
6.0.0 ≤
𝑥
< 6.4.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
puma
bookworm
5.6.5-3+deb12u1
fixed
bullseye
vulnerable
bullseye (security)
4.3.8-1+deb11u3
fixed
buster
no-dsa
forky
6.6.0-4
fixed
sid
6.6.0-4
fixed
trixie
6.6.0-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
puma
bionic
ignored
focal
Fixed 3.12.4-1ubuntu2+esm1
released
jammy
Fixed 5.5.2-2ubuntu2+esm1
released
lunar
Fixed 5.6.5-3ubuntu1.2
released
mantic
Fixed 5.6.5-4ubuntu2.1
released
noble
not-affected
oracular
not-affected
plucky
not-affected
questing
not-affected
trusty
ignored
xenial
ignored