logo

CVE-2019-16770 puma

Package

Manager: gem
Name: puma
Vulnerable Version: >=0 <3.12.2 || >=4.0.0 <4.3.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.01024 pctl0.76409

Details

A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack ## Keepalive thread overload/DoS ### Impact A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. ### Patches This vulnerability is patched in Puma 4.3.1 and 3.12.2. ### Workarounds Reverse proxies in front of Puma could be configured to always allow less than X keepalive connections to a Puma cluster or process, where X is the number of threads configured in Puma's thread pool. ### For more information If you have any questions or comments about this advisory: * Open an issue at [puma](github.com/puma/puma).

Metadata

Created: 2019-12-05T19:26:37Z
Modified: 2021-01-08T19:12:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/12/GHSA-7xx3-m584-x994/GHSA-7xx3-m584-x994.json
CWE IDs: ["CWE-770"]
Alternative ID: GHSA-7xx3-m584-x994
Finding: F002
Auto approve: 1