CVE-2022-24790
Ruby vulnerability analysis and mitigation

Overview

CVE-2022-24790 affects Puma, a simple, fast, multi-threaded HTTP 1.1 server for Ruby/Rack applications. The vulnerability was discovered and disclosed on March 30, 2022. The issue affects Puma versions up to 5.6.2 and 4.3.11, with fixes available in versions 5.6.4 and 4.3.12 (GitHub Advisory).

Technical details

The vulnerability occurs when using Puma behind a proxy that does not properly validate incoming HTTP requests against the RFC7230 standard. This can lead to disagreements between Puma and the frontend proxy about where requests start and end. The vulnerability involves several parsing issues: lenient parsing of Transfer-Encoding headers, malformed Content-Length headers, duplicate Content-Length headers, and improper validation of chunked segment endings. The issue has been assigned a CVSS v3.1 base score of 7.5 HIGH by NIST NVD, while GitHub rates it as 9.1 CRITICAL (NVD).

Impact

This vulnerability could allow attackers to perform HTTP request smuggling attacks through the front-end proxy to Puma. When successfully exploited, an attacker could smuggle requests through a proxy, potentially causing the proxy to send responses to unintended clients, leading to security implications such as request forgery or response queue poisoning (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Puma versions 5.6.4 or 4.3.12 which contain the security fixes. For users unable to upgrade immediately, a workaround is available by ensuring the front-end proxy strictly validates requests against the RFC7230 standard. Several proxy servers are known to have proper validation behavior, including latest versions of Nginx, Apache, Haproxy 2.5+, Caddy, and Traefik (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68696HIGH8.8
  • RubyRuby
  • ruby-httparty
NoYesDec 23, 2025
CVE-2025-68113MEDIUM6.5
  • JavaScriptJavaScript
  • org.altcha:altcha
NoYesDec 16, 2025
CVE-2025-14762MEDIUM6
  • RubyRuby
  • logstash-9.0
NoYesDec 17, 2025
GHSA-g9jg-w8vm-g96vMEDIUM4.6
  • JavaScriptJavaScript
  • trix
NoYesDec 31, 2025
CVE-2025-61594LOW2.7
  • RubyRuby
  • ruby:3.3::rubygem-json
NoYesDec 30, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management