CVE-2019-16786
Description
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: 'Transfer-Encoding: gzip, chunked' would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 90 Days)
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
IncompleteCommon Consequences
Applicable Platforms
Waitress by Agendaless
cpe:2.3:a:agendaless:waitress:*:*:*:*:*:*:*:*
Openstack by Redhat
cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*
Fedora by Fedoraproject
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
Fedora by Fedoraproject
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
Communications Cloud Native Core Network Function Cloud Native Environment by Oracle
cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*
Debian Linux by Debian
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*