Description
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.
Published: 2020-01-22
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3000-1 waitress security update
EUVD EUVD EUVD-2020-0239 Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.
Github GHSA Github GHSA GHSA-j7j6-7hfx-5522 Inconsistent Interpretation of HTTP Requests in Waitress
Github GHSA Github GHSA GHSA-4ppp-gpcr-7qf6 HTTP Request Smuggling: Content-Length Sent Twice in Waitress
History

No history.

Subscriptions

Agendaless Waitress
Debian Debian Linux
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-05T01:24:48.422Z

Reserved: 2019-09-24T00:00:00.000Z

Link: CVE-2019-16792

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-22T19:15:11.140

Modified: 2024-11-21T04:31:11.940

Link: CVE-2019-16792

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses