Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2020:0720 | Third Party Advisory |
https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes | Release Notes Vendor Advisory |
https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3 | Patch Third Party Advisory |
https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/ | |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
13 May 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Apr 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-12-20 23:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-16786
Mitre link : CVE-2019-16786
CVE.ORG link : CVE-2019-16786
JSON object : View
Products Affected
debian
- debian_linux
agendaless
- waitress
oracle
- communications_cloud_native_core_network_function_cloud_native_environment
redhat
- openstack
fedoraproject
- fedora
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')