CVE-2023-40175
Publication date 18 August 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Status
Package | Ubuntu Release | Status |
---|---|---|
puma | 24.10 oracular |
Fixed 5.6.5-4ubuntu2
|
24.04 LTS noble |
Fixed 5.6.5-4ubuntu2
|
|
22.04 LTS jammy |
Fixed 5.5.2-2ubuntu2+esm1
|
|
20.04 LTS focal |
Fixed 3.12.4-1ubuntu2+esm1
|
|
18.04 LTS bionic | Ignored end of standard support | |
16.04 LTS xenial | Ignored end of standard support | |
14.04 LTS trusty | Ignored end of standard support |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6399-1
- Puma vulnerability
- 27 September 2023
- USN-6682-1
- Puma vulnerabilities
- 7 March 2024