Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTk2OGYtNjZyNS01djc0
HTTP Request Smuggling in Waitress: Invalid whitespace characters in headers (Follow-up)
Impact
The patches introduced to fix https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 were not complete and still would allow an attacker to smuggle requests/split a HTTP request with invalid data.
This updates the existing CVE with ID: CVE-2019-16789
Patches
Waitress version 1.4.2 has been updated to now validate HTTP headers better to avoid the issue, completely fixing all known issues with whitespace.
Workarounds
There are no work-arounds, upgrading to Waitress 1.4.2 is highly recommended.
References
See https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 for more information on the security issue.
For more information
If you have any questions or comments about this advisory:
- open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
- email the Pylons Security mailing list: [email protected] (if security related)
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTk2OGYtNjZyNS01djc0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 5 years ago
Updated: 2 days ago
CVSS Score: 7.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N
Identifiers: GHSA-968f-66r5-5v74, CVE-2019-16789
References:
- https://github.com/Pylons/waitress/security/advisories/GHSA-968f-66r5-5v74
- https://nvd.nist.gov/vuln/detail/CVE-2019-16789
- https://github.com/github/advisory-review/pull/14604
- https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes
- https://access.redhat.com/errata/RHSA-2020:0720
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html
- https://github.com/Pylons/waitress/commit/ddb65b489d01d696afa1695b75fdd5df3e4ffdf8
- https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017
- https://github.com/advisories/GHSA-968f-66r5-5v74
- https://github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2019-138.yaml
- https://lists.fedoraproject.org/archives/list/[email protected]/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7
- https://lists.fedoraproject.org/archives/list/[email protected]/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5
Blast Radius: 31.2
Affected Packages
pypi:waitress
Dependent packages: 326Dependent repositories: 25,180
Downloads: 6,350,826 last month
Affected Version Ranges: < 1.4.2
Fixed in: 1.4.2
All affected versions: 0.6.1, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 0.8.6, 0.8.7, 0.8.8, 0.8.9, 0.8.10, 0.9.0, 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.2.0, 1.2.1, 1.3.0, 1.3.1, 1.4.0, 1.4.1
All unaffected versions: 1.4.2, 1.4.3, 1.4.4, 2.0.0, 2.1.0, 2.1.1, 2.1.2, 3.0.0, 3.0.1, 3.0.2