Vulnerability Details : CVE-2019-16789
In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.
Vulnerability category: Information leak
Products affected by CVE-2019-16789
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*
- Oracle » Communications Cloud Native Core Network Function Cloud Native Environment » Version: 1.10.0cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
- cpe:2.3:a:agendaless:waitress:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-16789
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-16789
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST | |
8.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N |
3.9
|
4.2
|
NIST | |
7.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N |
1.8
|
4.7
|
GitHub, Inc. |
CWE ids for CVE-2019-16789
-
The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2019-16789
-
https://www.oracle.com/security-alerts/cpuapr2022.html
Oracle Critical Patch Update Advisory - April 2022Patch;Third Party Advisory
-
https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes
Waitress — waitress 1.4.2 documentationRelease Notes;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/
[SECURITY] Fedora 30 Update: python-waitress-1.4.3-1.fc30 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html
[SECURITY] [DLA 3000-1] waitress security updateMailing List;Third Party Advisory
-
https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017
Merge pull request from GHSA-m5ff-3wj3-8ph4 · Pylons/waitress@11d9e13 · GitHubPatch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2020:0720
RHSA-2020:0720 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://github.com/github/advisory-review/pull/14604
Page not found · GitHub · GitHubBroken Link;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/
[SECURITY] Fedora 31 Update: python-waitress-1.4.3-1.fc31 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
Jump to