{ "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2019-16786", "STATE": "PUBLIC", "TITLE": "HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Waitress", "version": { "version_data": [ { "version_affected": "<=", "version_name": "<= 1.3.1", "version_value": "1.3.1" } ] } } ] }, "vendor_name": "Pylons" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: \"Transfer-Encoding: gzip, chunked\" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')" } ] } ] }, "references": { "reference_data": [ { "refsource": "FEDORA", "name": "FEDORA-2020-bdcc8ffc24", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/" }, { "refsource": "FEDORA", "name": "FEDORA-2020-65a7744e38", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/" }, { "refsource": "REDHAT", "name": "RHSA-2020:0720", "url": "https://access.redhat.com/errata/RHSA-2020:0720" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes", "refsource": "MISC", "url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes" }, { "name": "https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p", "refsource": "CONFIRM", "url": "https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p" }, { "name": "https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3", "refsource": "MISC", "url": "https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3" }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20220512 [SECURITY] [DLA 3000-1] waitress security update", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html" } ] }, "source": { "advisory": "GHSA-g2xc-35jw-c63p", "discovery": "UNKNOWN" } }