CVE-2019-16792: HTTP Request Smuggling: Content-Length Sent Twice in Waitress
(updated )
Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally.
So a request with:
Content-Length: 10
Content-Length: 10
would get transformed to:
Content-Length: 10, 10
Which would Waitress would then internally set to Content-Lenght: 0.
Waitress would then treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining.
References
- docs.pylonsproject.org/projects/waitress/en/latest/
- github.com/Pylons/waitress
- github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65
- github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6
- github.com/advisories/GHSA-4ppp-gpcr-7qf6
- github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2020-178.yaml
- lists.debian.org/debian-lts-announce/2022/05/msg00011.html
- nvd.nist.gov/vuln/detail/CVE-2019-16792
- www.oracle.com/security-alerts/cpuapr2022.html
Code Behaviors & Features
Detect and mitigate CVE-2019-16792 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →