CVE-2019-16785

Source
https://cve.org/CVERecord?id=CVE-2019-16785
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-16785.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-16785
Aliases
Downstream
Related
Published
2019-12-20T23:15:11.167Z
Modified
2026-02-12T00:29:27.668500Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if a front-end server does not parse header fields with an LF the same way as it does those with a CRLF it can lead to the front-end and the back-end server parsing the same HTTP message in two different ways. This can lead to a potential for HTTP request smuggling/splitting whereby Waitress may see two requests while the front-end server only sees a single HTTP message. This issue is fixed in Waitress 1.4.0.

References

Affected packages

Git / github.com/aria2/aria2

Affected ranges

Type
GIT
Repo
https://github.com/aria2/aria2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-16785.json"