ID CVE-2022-24761
Summary Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.
References
Vulnerable Configurations
  • cpe:2.3:a:agendaless:waitress:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.10:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.10:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.8.11:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:0.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:2.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:2.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:2.0.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:2.0.0:beta0:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:2.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:2.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:2.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:2.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:agendaless:waitress:2.1.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:agendaless:waitress:2.1.0:beta0:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 23-09-2022 - 18:57)
Impact:
Exploitability:
CWE CWE-444
CAPEC
  • HTTP Request Splitting
    HTTP Request Splitting (also known as HTTP Request Smuggling) is an attack pattern where an attacker attempts to insert additional HTTP requests in the body of the original (enveloping) HTTP request in such a way that the browser interprets it as one request but the web server interprets it as two. There are several ways to perform HTTP request splitting attacks. One way is to include double Content-Length headers in the request to exploit the fact that the devices parsing the request may each use a different header. Another way is to submit an HTTP request with a "Transfer Encoding: chunked" in the request header set with setRequestHeader to allow a payload in the HTTP Request that can be considered as another HTTP Request by a subsequent parsing entity. A third way is to use the "Double CR in an HTTP header" technique. There are also a few less general techniques targeting specific parsing vulnerabilities in certain web servers.
  • HTTP Request Smuggling
    HTTP Request Smuggling results from the discrepancies in parsing HTTP requests between HTTP entities such as web caching proxies or application firewalls. Entities such as web servers, web caching proxies, application firewalls or simple proxies often parse HTTP requests in slightly different ways. Under specific situations where there are two or more such entities in the path of the HTTP request, a specially crafted request is seen by two attacked entities as two different sets of requests. This allows certain requests to be smuggled through to a second entity without the first one realizing it.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
Last major update 23-09-2022 - 18:57
Published 17-03-2022 - 13:15
Last modified 23-09-2022 - 18:57
Back to Top