UBUNTU-CVE-2020-11077

Source
https://ubuntu.com/security/CVE-2020-11077
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-11077.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2020-11077
Upstream
Downstream
Related
Published
2020-05-22T15:15:00Z
Modified
2025-07-18T16:45:48Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N CVSS Calculator
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. This is a similar but different vulnerability from CVE-2020-11076. The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.

References

Affected packages

Ubuntu:Pro:20.04:LTS / puma

Package

Name
puma
Purl
pkg:deb/ubuntu/puma@3.12.4-1ubuntu2+esm1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.4-1ubuntu2+esm1

Affected versions

3.*

3.12.0-2ubuntu1
3.12.0-4ubuntu1
3.12.4-1ubuntu2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "puma",
            "binary_version": "3.12.4-1ubuntu2+esm1"
        },
        {
            "binary_name": "puma-dbgsym",
            "binary_version": "3.12.4-1ubuntu2+esm1"
        }
    ]
}