[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2019-16789Date: (C)2019-12-27   (M)2023-12-22


In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.2CVSS Score : 6.4
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 4.2Impact Score: 4.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: LOWAvailability: NONE
Integrity: HIGH 
Availability: NONE 
  
Reference:
FEDORA-2020-65a7744e38
FEDORA-2020-bdcc8ffc24
RHSA-2020:0720
https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html
https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes
https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017
https://github.com/github/advisory-review/pull/14604
https://www.oracle.com/security-alerts/cpuapr2022.html

CPE    1
cpe:/o:debian:debian_linux:9.0
CWE    1
CWE-444
OVAL    5
oval:org.secpod.oval:def:2105876
oval:org.secpod.oval:def:1801782
oval:org.secpod.oval:def:117875
oval:org.secpod.oval:def:117850
...

© SecPod Technologies