Vulnerability Description
In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Agendaless | Waitress | <= 1.4.0 |
| Oracle | Communications Cloud Native Core Network Function Cloud Native Environment | 1.10.0 |
| Debian | Debian Linux | 9.0 |
| Fedoraproject | Fedora | 30 |
| Redhat | Openstack | 15 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2020:0720Third Party Advisory
- https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixesRelease NotesVendor Advisory
- https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de0PatchThird Party Advisory
- https://github.com/github/advisory-review/pull/14604Broken LinkThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/05/msg00011.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.oracle.com/security-alerts/cpuapr2022.htmlPatchThird Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0720Third Party Advisory
- https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixesRelease NotesVendor Advisory
- https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de0PatchThird Party Advisory
- https://github.com/github/advisory-review/pull/14604Broken LinkThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/05/msg00011.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2019-16789?
CVE-2019-16789 is a vulnerability with a CVSS score of 7.1 (HIGH). In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leadi...
How severe is CVE-2019-16789?
CVE-2019-16789 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-16789?
Check the references section above for vendor advisories and patch information. Affected products include: Agendaless Waitress, Oracle Communications Cloud Native Core Network Function Cloud Native Environment, Debian Debian Linux, Fedoraproject Fedora, Redhat Openstack.