Lookup for vulnerable packages by Package URL.

Purlpkg:gem/puma@6.4.1
Typegem
Namespace
Namepuma
Version6.4.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.4.3
Latest_non_vulnerable_version6.4.3
Affected_by_vulnerabilities
0
url VCID-nxhw-rdtz-zyar
vulnerability_id VCID-nxhw-rdtz-zyar
summary
Puma HTTP Request/Response Smuggling vulnerability
### Impact
Prior to versions 6.4.2 and 5.6.8, puma exhibited dangerous behavior when parsing chunked transfer encoding bodies.

Fixed versions limit the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption.

### Patches

The vulnerability has been fixed in 6.4.2 and 5.6.8.

### Workarounds

No known workarounds.

### References

* [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling)
* Open an issue in [Puma](https://github.com/puma/puma)
* See our [security policy](https://github.com/puma/puma/security/policy)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21647.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21647
reference_id
reference_type
scores
0
value 0.0246
scoring_system epss
scoring_elements 0.85263
published_at 2026-04-18T12:55:00Z
1
value 0.0246
scoring_system epss
scoring_elements 0.85183
published_at 2026-04-02T12:55:00Z
2
value 0.0246
scoring_system epss
scoring_elements 0.85201
published_at 2026-04-04T12:55:00Z
3
value 0.0246
scoring_system epss
scoring_elements 0.85203
published_at 2026-04-07T12:55:00Z
4
value 0.0246
scoring_system epss
scoring_elements 0.85225
published_at 2026-04-08T12:55:00Z
5
value 0.0246
scoring_system epss
scoring_elements 0.85233
published_at 2026-04-09T12:55:00Z
6
value 0.0246
scoring_system epss
scoring_elements 0.85247
published_at 2026-04-11T12:55:00Z
7
value 0.0246
scoring_system epss
scoring_elements 0.85245
published_at 2026-04-12T12:55:00Z
8
value 0.0246
scoring_system epss
scoring_elements 0.85241
published_at 2026-04-13T12:55:00Z
9
value 0.0246
scoring_system epss
scoring_elements 0.85261
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21647
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21647
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/puma/puma
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/puma/puma
5
reference_url https://github.com/puma/puma/commit/5fc43d73b6ff193325e657a24ed76dec79133e93
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:56:45Z/
url https://github.com/puma/puma/commit/5fc43d73b6ff193325e657a24ed76dec79133e93
6
reference_url https://github.com/puma/puma/commit/60d5ee3734adc8cee85c3f0561af392448fe19b7
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/puma/puma/commit/60d5ee3734adc8cee85c3f0561af392448fe19b7
7
reference_url https://github.com/puma/puma/commit/bbb880ffb6debbfdea535b4b3eb2204d49ae151d
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/puma/puma/commit/bbb880ffb6debbfdea535b4b3eb2204d49ae151d
8
reference_url https://github.com/puma/puma/security/advisories/GHSA-c2f4-cvqm-65w2
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:56:45Z/
url https://github.com/puma/puma/security/advisories/GHSA-c2f4-cvqm-65w2
9
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2024-21647.yml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2024-21647.yml
10
reference_url https://lists.debian.org/debian-lts-announce/2024/11/msg00004.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/11/msg00004.html
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-21647
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-21647
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060345
reference_id 1060345
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060345
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257340
reference_id 2257340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257340
14
reference_url https://github.com/advisories/GHSA-c2f4-cvqm-65w2
reference_id GHSA-c2f4-cvqm-65w2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c2f4-cvqm-65w2
15
reference_url https://usn.ubuntu.com/6597-1/
reference_id USN-6597-1
reference_type
scores
url https://usn.ubuntu.com/6597-1/
16
reference_url https://usn.ubuntu.com/6682-1/
reference_id USN-6682-1
reference_type
scores
url https://usn.ubuntu.com/6682-1/
fixed_packages
0
url pkg:gem/puma@6.4.2
purl pkg:gem/puma@6.4.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pvph-c6vu-qkhn
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/puma@6.4.2
aliases CVE-2024-21647, GHSA-c2f4-cvqm-65w2
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxhw-rdtz-zyar
1
url VCID-pvph-c6vu-qkhn
vulnerability_id VCID-pvph-c6vu-qkhn
summary
Puma's header normalization allows for client to clobber proxy set headers
### Impact

Clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users trusting headers set by their proxy may be affected. Attackers may be able to downgrade connections to HTTP (non-SSL) or redirect responses, which could cause confidentiality leaks if combined with a separate MITM attack. 

### Patches
v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win.

### Workarounds
Nginx has a [underscores_in_headers](https://nginx.org/en/docs/http/ngx_http_core_module.html#underscores_in_headers) configuration variable to discard these headers at the proxy level.

Any users that are implicitly trusting the proxy defined headers for security or availability should immediately cease doing so until upgraded to the fixed versions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45614.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45614
reference_id
reference_type
scores
0
value 0.00739
scoring_system epss
scoring_elements 0.7295
published_at 2026-04-18T12:55:00Z
1
value 0.00739
scoring_system epss
scoring_elements 0.7294
published_at 2026-04-16T12:55:00Z
2
value 0.00739
scoring_system epss
scoring_elements 0.72898
published_at 2026-04-13T12:55:00Z
3
value 0.00739
scoring_system epss
scoring_elements 0.72906
published_at 2026-04-12T12:55:00Z
4
value 0.00739
scoring_system epss
scoring_elements 0.72923
published_at 2026-04-11T12:55:00Z
5
value 0.00739
scoring_system epss
scoring_elements 0.72899
published_at 2026-04-09T12:55:00Z
6
value 0.00739
scoring_system epss
scoring_elements 0.72847
published_at 2026-04-07T12:55:00Z
7
value 0.00739
scoring_system epss
scoring_elements 0.72885
published_at 2026-04-08T12:55:00Z
8
value 0.0076
scoring_system epss
scoring_elements 0.73289
published_at 2026-04-02T12:55:00Z
9
value 0.0076
scoring_system epss
scoring_elements 0.73312
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45614
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45614
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/puma/puma
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/puma/puma
5
reference_url https://github.com/puma/puma/commit/cac3fd18cf29ed43719ff5d52d9cfec215f0a043
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/puma/puma/commit/cac3fd18cf29ed43719ff5d52d9cfec215f0a043
6
reference_url https://github.com/puma/puma/commit/f196b23be24712fb8fb16051cc124798cc84f70e
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/puma/puma/commit/f196b23be24712fb8fb16051cc124798cc84f70e
7
reference_url https://github.com/puma/puma/security/advisories/GHSA-9hf4-67fc-4vf4
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-20T13:54:35Z/
url https://github.com/puma/puma/security/advisories/GHSA-9hf4-67fc-4vf4
8
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2024-45614.yml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2024-45614.yml
9
reference_url https://lists.debian.org/debian-lts-announce/2024/11/msg00004.html
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/11/msg00004.html
10
reference_url https://nginx.org/en/docs/http/ngx_http_core_module.html#underscores_in_headers
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-20T13:54:35Z/
url https://nginx.org/en/docs/http/ngx_http_core_module.html#underscores_in_headers
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-45614
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-45614
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082379
reference_id 1082379
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082379
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2313672
reference_id 2313672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2313672
14
reference_url https://github.com/advisories/GHSA-9hf4-67fc-4vf4
reference_id GHSA-9hf4-67fc-4vf4
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9hf4-67fc-4vf4
15
reference_url https://usn.ubuntu.com/7031-1/
reference_id USN-7031-1
reference_type
scores
url https://usn.ubuntu.com/7031-1/
16
reference_url https://usn.ubuntu.com/7031-2/
reference_id USN-7031-2
reference_type
scores
url https://usn.ubuntu.com/7031-2/
fixed_packages
0
url pkg:gem/puma@6.4.3
purl pkg:gem/puma@6.4.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/puma@6.4.3
aliases CVE-2024-45614, GHSA-9hf4-67fc-4vf4
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pvph-c6vu-qkhn
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/puma@6.4.1