The patches introduced to fix https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 were not complete and still would allow an attacker to smuggle requests/split a HTTP request with invalid data.
This updates the existing CVE with ID: CVE-2019-16789
Waitress version 1.4.2 has been updated to now validate HTTP headers better to avoid the issue, completely fixing all known issues with whitespace.
There are no work-arounds, upgrading to Waitress 1.4.2 is highly recommended.
See https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 for more information on the security issue.
If you have any questions or comments about this advisory:
{ "nvd_published_at": "2019-12-26T17:15:00Z", "cwe_ids": [ "CWE-444" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-01-06T18:43:11Z" }