Agendaless

Waitress

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.37%
  • Veröffentlicht 29.10.2024 15:15:12
  • Zuletzt bearbeitet 21.11.2024 09:41:49

Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread...

  • EPSS 0.04%
  • Veröffentlicht 29.10.2024 15:15:11
  • Zuletzt bearbeitet 07.11.2024 17:28:02

Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may send a request that is exactly recv_bytes (defaults to 8192) long, followed by a secondary request using HTTP pipelining. When request lookahead is disabled (de...

Exploit
  • EPSS 0.44%
  • Veröffentlicht 31.05.2022 23:15:07
  • Zuletzt bearbeitet 21.11.2024 07:03:43

Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an...

  • EPSS 0.2%
  • Veröffentlicht 17.03.2022 13:15:07
  • Zuletzt bearbeitet 21.11.2024 06:51:02

Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy ...

  • EPSS 15.5%
  • Veröffentlicht 04.02.2020 03:15:10
  • Zuletzt bearbeitet 21.11.2024 05:33:44

Waitress version 1.4.2 allows a DOS attack When waitress receives a header that contains invalid characters. When a header like "Bad-header: xxxxxxxxxxxxxxx\x10" is received, it will cause the regular expression engine to catastrophically backtrack c...

  • EPSS 0.85%
  • Veröffentlicht 22.01.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:11

Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Co...

  • EPSS 0.6%
  • Veröffentlicht 26.12.2019 17:15:13
  • Zuletzt bearbeitet 21.11.2024 04:31:11

In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Spec...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 20.12.2019 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:11

Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any pr...

  • EPSS 0.52%
  • Veröffentlicht 20.12.2019 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:11

Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-En...