Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/gitlab-puma@4.0.0
purl pkg:gem/gitlab-puma@4.0.0
Tags Ghost
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-ap87-c4dc-zfcy
Aliases:
CVE-2020-5249
GHSA-33vf-4xgg-9r58
HTTP Response Splitting (Early Hints) in Puma ### Impact If an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting). While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to [CVE-2020-5247](https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v), which fixed this vulnerability but only for regular responses. ### Patches This has been fixed in 4.3.3 and 3.12.4. ### Workarounds Users can not allow untrusted/user input in the Early Hints response header. ### For more information If you have any questions or comments about this advisory: * Open an issue in [puma](https://github.com/puma/puma) * Email us a project maintainer. [Email addresses are listed in our Code of Conduct](https://github.com/puma/puma/blob/master/CODE_OF_CONDUCT.md#enforcement).
4.3.3
Affected by 0 other vulnerabilities.
VCID-bk4b-h5hu-2qeq
Aliases:
CVE-2020-11077
GHSA-w64w-qqph-5gxm
HTTP Smuggling via Transfer-Encoding Header in Puma ### Impact This is a similar but different vulnerability to the one patched in 3.12.5 and 4.3.4. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. ### Patches The problem has been fixed in Puma 3.12.6 and Puma 4.3.5. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
4.3.5.gitlab.3
Affected by 4 other vulnerabilities.
VCID-euqw-bed6-z7d6
Aliases:
CVE-2020-11076
GHSA-x7jg-6pwg-fx5h
HTTP Smuggling via Transfer-Encoding Header in Puma ### Impact By using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling) Originally reported by @ZeddYu, who has our thanks for the detailed report. ### Patches The problem has been fixed in Puma 3.12.5 and Puma 4.3.4. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
4.3.5.gitlab.3
Affected by 4 other vulnerabilities.
VCID-pr2m-wx1b-hqbz
Aliases:
CVE-2020-5247
GHSA-84j7-475p-hp8v
HTTP Response Splitting in Puma In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
4.3.3
Affected by 0 other vulnerabilities.
VCID-tsrb-zgtb-8ybu
Aliases:
CVE-2019-16770
GHSA-7xx3-m584-x994
## Keepalive thread overload/DoS ### Impact A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. ### Patches This vulnerability is patched in Puma 4.3.1 and 3.12.2. ### Workarounds Reverse proxies in front of Puma could be configured to always allow less than X keepalive connections to a Puma cluster or process, where X is the number of threads configured in Puma's thread pool. ### For more information If you have any questions or comments about this advisory: * Open an issue at [puma](github.com/puma/puma).
4.3.1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-02T12:36:46.150952+00:00 GitLab Importer Affected by VCID-euqw-bed6-z7d6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/gitlab-puma/CVE-2020-11076.yml 38.0.0
2026-04-02T12:36:45.925005+00:00 GitLab Importer Affected by VCID-bk4b-h5hu-2qeq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/gitlab-puma/CVE-2020-11077.yml 38.0.0
2026-04-02T12:36:28.496105+00:00 GitLab Importer Affected by VCID-ap87-c4dc-zfcy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/gitlab-puma/CVE-2020-5249.yml 38.0.0
2026-04-02T12:36:28.374160+00:00 GitLab Importer Affected by VCID-pr2m-wx1b-hqbz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/gitlab-puma/CVE-2020-5247.yml 38.0.0
2026-04-02T12:36:14.332625+00:00 GitLab Importer Affected by VCID-tsrb-zgtb-8ybu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/gitlab-puma/CVE-2019-16770.yml 38.0.0