eldorplus / docker-web-ui

Docker Automation
0 stars 0 forks source link

CVE-2022-23634 (Medium) detected in puma-3.4.0.gem, actionpack-5.0.0.gem #83

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2022-23634 - Medium Severity Vulnerability

Vulnerable Libraries - puma-3.4.0.gem, actionpack-5.0.0.gem

puma-3.4.0.gem

Puma is a simple, fast, threaded, and highly concurrent HTTP 1.1 server for Ruby/Rack applications. Puma is intended for use in both development and production environments. In order to get the best throughput, it is highly recommended that you use a Ruby implementation with real threads like Rubinius or JRuby.

Library home page: https://rubygems.org/gems/puma-3.4.0.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /ms/2.3.0/cache/puma-3.4.0.gem

Dependency Hierarchy: - :x: **puma-3.4.0.gem** (Vulnerable Library)

actionpack-5.0.0.gem

Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

Library home page: https://rubygems.org/gems/actionpack-5.0.0.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /var/lib/gems/2.3.0/cache/actionpack-5.0.0.gem

Dependency Hierarchy: - dotenv-rails-2.1.1.gem (Root Library) - railties-5.0.0.gem - :x: **actionpack-5.0.0.gem** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability.

Publish Date: 2022-02-11

URL: CVE-2022-23634

CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h,https://github.com/advisories/GHSA-wh98-p28r-vrc9

Release Date: 2022-02-11

Fix Resolution: puma - 4.3.11, 5.6.2; actionpack - 5.2.6.2, 6.0.4.6, 6.1.4.6, 7.0.2.2


Step up your Open Source Security Game with Mend here