CVE-2019-16786: HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress
(updated )
Waitress would parse the Transfer-Encoding
header and only look for a single string value, if that value was not chunked
it would fall through and use the Content-Length
header instead.
According to the HTTP standard Transfer-Encoding
should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked
.
Requests sent with:
Transfer-Encoding: gzip, chunked
Would incorrectly get ignored, and the request would use a Content-Length
header instead to determine the body size of the HTTP message.
This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining.
References
- access.redhat.com/errata/RHSA-2020:0720
- docs.pylonsproject.org/projects/waitress/en/latest/
- github.com/Pylons/waitress
- github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3
- github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p
- github.com/advisories/GHSA-g2xc-35jw-c63p
- github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2019-137.yaml
- lists.debian.org/debian-lts-announce/2022/05/msg00011.html
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5
- nvd.nist.gov/vuln/detail/CVE-2019-16786
- www.oracle.com/security-alerts/cpuapr2022.html
Detect and mitigate CVE-2019-16786 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →