First published: Thu Dec 26 2019(Updated: )
### Impact The patches introduced to fix https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 were not complete and still would allow an attacker to smuggle requests/split a HTTP request with invalid data. This updates the existing CVE with ID: CVE-2019-16789 ### Patches Waitress version 1.4.2 has been updated to now validate HTTP headers better to avoid the issue, completely fixing all known issues with whitespace. ### Workarounds There are no work-arounds, upgrading to Waitress 1.4.2 is highly recommended. ### References See https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 for more information on the security issue. ### For more information If you have any questions or comments about this advisory: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/waitress | <1.4.2 | 1.4.2 |
redhat/waitress | <1.4.1 | 1.4.1 |
redhat/python-waitress | <0:1.4.2-1.el8 | 0:1.4.2-1.el8 |
Agendaless Waitress | <=1.4.0 | |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment | =1.10.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Redhat Openstack | =15 | |
debian/waitress | 1.2.0~b2-2+deb10u1 1.4.4-1.1+deb11u1 2.1.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-16789.
The impact of this vulnerability is that it allows an attacker to smuggle requests or split a HTTP request with invalid data.
The severity of CVE-2019-16789 is rated as high with a severity value of 8.2.
To fix CVE-2019-16789 in Waitress, update to version 1.4.2 or higher.
You can find more information about CVE-2019-16789 at the following references: [GitHub Advisory](https://github.com/Pylons/waitress/security/advisories/GHSA-968f-66r5-5v74) and [NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-16789).