Sha256: eb903746aba23fbcff6bbcb133a7558816d91d40c886522dd67be48ec9c47237

Contents?: true

Size: 1.12 KB

Versions: 1

Compression:

Stored size: 1.12 KB

Contents

---
gem: puma
cve: 2020-5249
ghsa: 33vf-4xgg-9r58
url: https://github.com/puma/puma/security/advisories/GHSA-33vf-4xgg-9r58
date: 2020-03-03
title: HTTP Response Splitting (Early Hints) in Puma
description: |-
  ### Impact
  If an application using Puma allows untrusted input in an early-hints header,
  an attacker can use a carriage return character to end the header and inject
  malicious content, such as additional headers or an entirely new response body.
  This vulnerability is known as [HTTP Response
  Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting)

  While not an attack in itself, response splitting is a vector for several other
  attacks, such as cross-site scripting (XSS).

  This is related to [CVE-2020-5247](https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v),
  which fixed this vulnerability but only for regular responses.

  ### Patches
  This has been fixed in 4.3.3 and 3.12.4.

  ### Workarounds
  Users can not allow untrusted/user input in the Early Hints response header.

cvss_v3: 6.5

patched_versions:
  - "~> 3.12.4"
  - ">= 4.3.3"

related:
  cve:
    - 2020-5247

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/puma/CVE-2020-5249.yml