Логотип exploitDog
bind:CVE-2019-16789
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-16789

Количество 9

Количество 9

ubuntu логотип

CVE-2019-16789

около 6 лет назад

In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2019-16789

около 6 лет назад

In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.

CVSS3: 8.2
EPSS: Низкий
nvd логотип

CVE-2019-16789

около 6 лет назад

In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2019-16789

около 6 лет назад

In Waitress through version 1.4.0, if a proxy server is used in front ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-968f-66r5-5v74

около 6 лет назад

HTTP Request Smuggling in Waitress: Invalid whitespace characters in headers (Follow-up)

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2022-05832

около 6 лет назад

Уязвимость WSGI сервера для python Waitress, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 8.2
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1922-1

около 5 лет назад

Security update for python-waitress

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1911-1

около 5 лет назад

Security update for python-waitress

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3269-1

около 5 лет назад

Security update for python-waitress

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-16789

In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.

CVSS3: 7.1
1%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-16789

In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.

CVSS3: 8.2
1%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-16789

In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.

CVSS3: 7.1
1%
Низкий
около 6 лет назад
debian логотип
CVE-2019-16789

In Waitress through version 1.4.0, if a proxy server is used in front ...

CVSS3: 7.1
1%
Низкий
около 6 лет назад
github логотип
GHSA-968f-66r5-5v74

HTTP Request Smuggling in Waitress: Invalid whitespace characters in headers (Follow-up)

CVSS3: 7.1
1%
Низкий
около 6 лет назад
fstec логотип
BDU:2022-05832

Уязвимость WSGI сервера для python Waitress, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 8.2
1%
Низкий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1922-1

Security update for python-waitress

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1911-1

Security update for python-waitress

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3269-1

Security update for python-waitress

около 5 лет назад

Уязвимостей на страницу