You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Puma is a simple, fast, threaded, and highly concurrent HTTP 1.1 server for Ruby/Rack applications. Puma is intended for use in both development and production environments. It's great for highly concurrent Ruby implementations such as Rubinius and JRuby as well as as providing process worker support to support CRuby well.
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/puma-3.12.6.gem
Dependency Hierarchy:
❌ puma-3.12.6.gem (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Puma is a Ruby/Rack web server built for parallelism. Prior to puma version 5.6.2, puma may not always call close on the response body. Rails, prior to version 7.0.2.2, depended on the response body being closed in order for its CurrentAttributes implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails or Puma version fixes the vulnerability.
mend-bolt-for-githubbot
changed the title
CVE-2022-23634 (High) detected in actionpack-5.2.3.gem
CVE-2022-23634 (Medium) detected in puma-3.12.6.gem, actionpack-5.2.3.gem
Mar 4, 2022
mend-bolt-for-githubbot
changed the title
CVE-2022-23634 (Medium) detected in puma-3.12.6.gem, actionpack-5.2.3.gem
CVE-2022-23634 (Medium) detected in puma-3.12.6.gem
Mar 8, 2023
CVE-2022-23634 - Medium Severity Vulnerability
Vulnerable Library - puma-3.12.6.gem
Puma is a simple, fast, threaded, and highly concurrent HTTP 1.1 server for Ruby/Rack applications. Puma is intended for use in both development and production environments. It's great for highly concurrent Ruby implementations such as Rubinius and JRuby as well as as providing process worker support to support CRuby well.
Library home page: https://rubygems.org/gems/puma-3.12.6.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/puma-3.12.6.gem
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Puma is a Ruby/Rack web server built for parallelism. Prior to
puma
version5.6.2
,puma
may not always callclose
on the response body. Rails, prior to version7.0.2.2
, depended on the response body being closed in order for itsCurrentAttributes
implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails or Puma version fixes the vulnerability.Publish Date: 2022-02-11
URL: CVE-2022-23634
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-wh98-p28r-vrc9
Release Date: 2022-02-11
Fix Resolution: puma - 4.3.11, 5.6.2; actionpack - 5.2.6.2, 6.0.4.6, 6.1.4.6, 7.0.2.2
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: