An open API service providing security vulnerability metadata for many open source software ecosystems.

MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTk2OGYtNjZyNS01djc0

Moderate CVSS: 5.1 EPSS: 0.00603% (0.68596 Percentile) EPSS:

HTTP Request Smuggling in Waitress: Invalid whitespace characters in headers (Follow-up)

Affected Packages Affected Versions Fixed Versions
pypi:waitress
PURL: pkg:pypi/waitress
< 1.4.2 1.4.2
326 Dependent packages
25,180 Dependent repositories
6,812,121 Downloads last month

Affected Version Ranges

All affected versions

0.6.1, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 0.8.6, 0.8.7, 0.8.8, 0.8.9, 0.8.10, 0.8.11b0, 0.9.0, 0.9.0b0, 0.9.0b1, 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.2.0, 1.2.0b1, 1.2.0b2, 1.2.0b3, 1.2.1, 1.3.0, 1.3.0b0, 1.3.1, 1.4.0, 1.4.1

All unaffected versions

1.4.2, 1.4.3, 1.4.4, 2.0.0, 2.0.0b0, 2.0.0b1, 2.1.0, 2.1.0b0, 2.1.1, 2.1.2, 3.0.0, 3.0.1, 3.0.2

Impact

The patches introduced to fix https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 were not complete and still would allow an attacker to smuggle requests/split a HTTP request with invalid data.

This updates the existing CVE with ID: CVE-2019-16789

Patches

Waitress version 1.4.2 has been updated to now validate HTTP headers better to avoid the issue, completely fixing all known issues with whitespace.

Workarounds

There are no work-arounds, upgrading to Waitress 1.4.2 is highly recommended.

References

See https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 for more information on the security issue.

For more information

If you have any questions or comments about this advisory:

References: