Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3947-1 | puma security update |
EUVD |
EUVD-2024-2761 | Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on proxy set variables is affected. v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win. Users are advised to upgrade. Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level as a mitigation. Any users that are implicitly trusting the proxy defined headers for security should immediately cease doing so until upgraded to the fixed versions. |
Github GHSA |
GHSA-9hf4-67fc-4vf4 | Puma's header normalization allows for client to clobber proxy set headers |
Ubuntu USN |
USN-7031-1 | Puma vulnerability |
Ubuntu USN |
USN-7031-2 | Puma vulnerability |
Mon, 03 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 26 Sep 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Puma
Puma puma |
|
| Weaknesses | CWE-444 | |
| CPEs | cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:* | |
| Vendors & Products |
Puma
Puma puma |
Fri, 20 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Sep 2024 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 19 Sep 2024 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on proxy set variables is affected. v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win. Users are advised to upgrade. Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level as a mitigation. Any users that are implicitly trusting the proxy defined headers for security should immediately cease doing so until upgraded to the fixed versions. | |
| Title | Header normalization allows for client to clobber proxy set headers in Puma | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T22:15:51.621Z
Reserved: 2024-09-02T16:00:02.425Z
Link: CVE-2024-45614
Updated: 2025-11-03T22:15:51.621Z
Status : Modified
Published: 2024-09-19T23:15:11.703
Modified: 2025-11-03T23:15:51.233
Link: CVE-2024-45614
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN