Debian LTS Advisory ([SECURITY] [DLA 2056-1] waitress security update)

Published: 2020-01-02 03:00:08

CVSS Base Vector:

The remote host is missing an update for the 'waitress' Linux Distribution Package(s) announced via the DSA-2056-1 advisory.

Detection Method:
Checks if a vulnerable Linux Distribution Package version is present on the target host.

Technical Details:
It was discovered that there was a HTTP request smuggling vulnerability in waitress, pure-Python WSGI server. If a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or information disclosure.

Affected Versions:
'waitress' Linux Distribution Package(s) on Debian Linux.

For Debian 8 'Jessie', this issue has been fixed in waitress version 0.8.9-2+deb8u1. We recommend that you upgrade your waitress Linux Distribution Packages.

Solution Type:
Vendor Patch

Detection Type:
Linux Distribution Package


CVSS Score

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.