CVE-2024-21647

Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. This vulnerability has been fixed in versions 6.4.2 and 5.6.8.

HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 80%
VendorProductVersion
pumapuma
𝑥
< 5.6.8
pumapuma
6.0.0 ≤
𝑥
< 6.4.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
puma
bullseye
vulnerable
buster
no-dsa
bullseye (security)
4.3.8-1+deb11u3
fixed
bookworm
5.6.5-3+deb12u1
fixed
sid
6.6.0-2
fixed
trixie
6.6.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
puma
plucky
not-affected
oracular
not-affected
noble
not-affected
mantic
Fixed 5.6.5-4ubuntu2.1
released
lunar
Fixed 5.6.5-3ubuntu1.2
released
jammy
Fixed 5.5.2-2ubuntu2+esm1
released
focal
Fixed 3.12.4-1ubuntu2+esm1
released
bionic
ignored
xenial
ignored
trusty
ignored