प्लेटफ़ॉर्म
ruby
घटक
puma
में ठीक किया गया
3.12.7
4.0.1
3.12.6
CVE-2020-11077 describes an HTTP request smuggling vulnerability discovered in Puma, a Ruby web server. This flaw allows a malicious client to smuggle requests through a proxy, potentially causing unexpected behavior and unauthorized access. The vulnerability impacts Puma versions 3.9.1 and earlier; upgrading to version 3.12.6 resolves the issue.
The core of this vulnerability lies in Puma's handling of HTTP requests within a proxy environment. An attacker can craft a malicious request that, when passed through a proxy, is misinterpreted by Puma. This misinterpretation can lead to the proxy sending a response intended for another client back to the attacker, effectively hijacking the connection. HTTP pipelining exacerbates the issue, as the attacker can inject additional requests into the pipeline, further confusing the proxy and Puma's processing. The potential impact includes unauthorized access to sensitive data, session hijacking, and potentially even remote code execution if the proxy is misconfigured or vulnerable itself.
CVE-2020-11077 shares similarities with the request smuggling vulnerability patched in Puma versions 3.12.5 and 4.3.4. While no active exploitation campaigns have been publicly reported specifically targeting this CVE, the general risk of HTTP request smuggling remains a concern. The vulnerability was publicly disclosed on May 22, 2020. It is not currently listed on the CISA KEV catalog.
Organizations utilizing Puma as their web server, particularly those operating behind reverse proxies or load balancers, are at risk. Environments with legacy proxy configurations or those relying on HTTP pipelining are especially vulnerable. Ruby applications deployed in production using Puma are also at risk.
• linux / server:
journalctl -u puma -g "unexpected response" -g "request smuggling"• generic web:
curl -v <target_url> 2>&1 | grep -i 'HTTP/1.1 100 Continue' # Check for unexpected 100 Continue responsesdisclosure
एक्सप्लॉइट स्थिति
EPSS
0.82% (74% शतमक)
CVSS वेक्टर
The primary mitigation for CVE-2020-11077 is to upgrade Puma to version 3.12.6 or later. If an immediate upgrade is not feasible, consider implementing temporary workarounds. Carefully review proxy configurations to ensure proper request handling and prevent unexpected behavior. Deploying a Web Application Firewall (WAF) with rules to detect and block HTTP smuggling attempts can provide an additional layer of defense. Monitor Puma logs for unusual patterns or errors that might indicate exploitation. Specifically, look for discrepancies in request processing times or unexpected responses.
Actualice la gema Puma a la versión 3.12.6 o superior, o a la versión 4.3.5 o superior. Esto solucionará la vulnerabilidad de HTTP Smuggling a través del encabezado Transfer-Encoding. Ejecute `gem update puma` para actualizar.
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2020-11077 is a medium severity vulnerability in Puma versions 3.9.1 and earlier that allows attackers to smuggle HTTP requests through a proxy, potentially leading to unauthorized access.
Yes, if you are using Puma versions 3.9.1 or earlier, you are affected by this vulnerability. Upgrade to Puma 3.12.6 or later to mitigate the risk.
The recommended fix is to upgrade Puma to version 3.12.6 or later. If an upgrade is not immediately possible, implement temporary workarounds such as WAF rules and proxy configuration adjustments.
While no active exploitation campaigns have been publicly reported specifically targeting this CVE, the general risk of HTTP request smuggling remains a concern.
Refer to the Puma security advisory for detailed information and updates: https://github.com/puma/puma/security/advisories/GHSA-5939-9644-784c
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।
अपनी Gemfile.lock फ़ाइल अपलोड करें और तुरंत जानें कि आप प्रभावित हैं या नहीं।