Source: puma X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security
Hi, The following vulnerability was published for puma. CVE-2024-45614[0]: | Puma is a Ruby/Rack web server built for parallelism. In affected | versions clients could clobber values set by intermediate proxies | (such as X-Forwarded-For) by providing a underscore version of the | same header (X-Forwarded_For). Any users relying on proxy set | variables is affected. v6.4.3/v5.6.9 now discards any headers using | underscores if the non-underscore version also exists. Effectively, | allowing the proxy defined headers to always win. Users are advised | to upgrade. Nginx has a underscores_in_headers configuration | variable to discard these headers at the proxy level as a | mitigation. Any users that are implicitly trusting the proxy defined | headers for security should immediately cease doing so until | upgraded to the fixed versions. https://github.com/puma/puma/security/advisories/GHSA-9hf4-67fc-4vf4 If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-45614 https://www.cve.org/CVERecord?id=CVE-2024-45614 Please adjust the affected versions in the BTS as needed.