CVE-2019-16792

NameCVE-2019-16792
DescriptionWaitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3000-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
waitress (PTS)buster, buster (security)1.2.0~b2-2+deb10u1fixed
bullseye (security), bullseye1.4.4-1.1+deb11u1fixed
sid, trixie, bookworm2.1.2-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
waitresssourcestretch1.0.1-1+deb9u1DLA-3000-1
waitresssourcebuster1.2.0~b2-2+deb10u1
waitresssource(unstable)1.4.1-1

Notes

[jessie] - waitress <no-dsa> (Minor issue)
https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6
https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65

Search for package or bug name: Reporting problems