Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-16792

Опубликовано: 22 янв. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 7.1

Описание

Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

1.4.1-1
eoan

ignored

end of life
esm-apps/noble

not-affected

1.4.1-1
esm-infra-legacy/trusty

DNE

esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

1.4.1-1
esm-infra/xenial

needs-triage

focal

not-affected

1.4.1-1
groovy

not-affected

1.4.1-1

Показывать по

EPSS

Процентиль: 74%
0.00851
Низкий

5 Medium

CVSS2

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
nvd
около 6 лет назад

Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.

CVSS3: 7.1
debian
около 6 лет назад

Waitress through version 1.3.1 allows request smuggling by sending the ...

github
около 6 лет назад

HTTP Request Smuggling: Content-Length Sent Twice in Waitress

CVSS3: 7.5
fstec
около 6 лет назад

Уязвимость WSGI сервера для python Waitress, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных

suse-cvrf
около 5 лет назад

Security update for python-waitress

EPSS

Процентиль: 74%
0.00851
Низкий

5 Medium

CVSS2

7.1 High

CVSS3