CVE-2019-16786
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2019-16786. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1EPSS Score
v2025.03.14There is a 0.5% chance that this vulnerability will be exploited in the wild within the next 30 days.
Attack Vector Metrics
Impact Metrics
Description
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.
Available Exploits
Related News
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress
GHSA-g2xc-35jw-c63pAdvisory Details
Affected Packages
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: December 20, 2019, Modified: November 19, 2024