[DRE-maint] Bug#1082379: puma: CVE-2024-45614

Moritz Mühlenhoff jmm at inutil.org
Fri Sep 20 15:04:46 BST 2024


Source: puma
X-Debbugs-CC: team at security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for puma.

CVE-2024-45614[0]:
| Puma is a Ruby/Rack web server built for parallelism. In affected
| versions clients could clobber values set by intermediate proxies
| (such as X-Forwarded-For) by providing a underscore version of the
| same header (X-Forwarded_For). Any users relying on proxy set
| variables is affected. v6.4.3/v5.6.9 now discards any headers using
| underscores if the non-underscore version also exists. Effectively,
| allowing the proxy defined headers to always win. Users are advised
| to upgrade. Nginx has a underscores_in_headers configuration
| variable to discard these headers at the proxy level as a
| mitigation. Any users that are implicitly trusting the proxy defined
| headers for security should immediately cease doing so until
| upgraded to the fixed versions.

https://github.com/puma/puma/security/advisories/GHSA-9hf4-67fc-4vf4


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-45614
    https://www.cve.org/CVERecord?id=CVE-2024-45614

Please adjust the affected versions in the BTS as needed.



More information about the Pkg-ruby-extras-maintainers mailing list