CVE-2020-5236

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-5236
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-5236.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-5236
Aliases
Published
2020-02-04T03:15:10Z
Modified
2024-10-12T06:36:24.817638Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Waitress version 1.4.2 allows a DOS attack When waitress receives a header that contains invalid characters. When a header like "Bad-header: xxxxxxxxxxxxxxx\x10" is received, it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions. This allows an attacker to send a single request with an invalid header and take the service offline. This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230. The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible.

References

Affected packages

Git / github.com/pylons/waitress

Affected ranges

Type
GIT
Repo
https://github.com/pylons/waitress
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1
0.2
0.3
0.4
0.5
0.6
0.6.1
0.7
0.8
0.8.1
0.8.10
0.8.11b0
0.8.2
0.8.3
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.9
0.9.0b0

v0.*

v0.9.0
v0.9.0b1

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.0a1
v1.0a2
v1.1.0
v1.2.0
v1.2.0b1
v1.2.0b2
v1.2.0b3
v1.2.1
v1.3.0
v1.3.0b0
v1.3.1
v1.4.0
v1.4.1
v1.4.2