Skip to content

Commit 6080ac9

Browse files
1 parent f2e3ca0 commit 6080ac9

File tree

4 files changed

+106
-47
lines changed

4 files changed

+106
-47
lines changed

advisories/github-reviewed/2019/12/GHSA-4ppp-gpcr-7qf6/GHSA-4ppp-gpcr-7qf6.json

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4ppp-gpcr-7qf6",
4-
"modified": "2022-03-24T17:52:19Z",
4+
"modified": "2026-01-22T22:34:11Z",
55
"published": "2019-12-20T23:04:35Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2019-16792"
8+
],
79
"summary": "HTTP Request Smuggling: Content-Length Sent Twice in Waitress",
810
"details": "### Impact\n\nWaitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally.\n\nSo a request with:\n\n```\nContent-Length: 10\nContent-Length: 10\n```\n\nwould get transformed to:\n\n```\nContent-Length: 10, 10\n```\n\nWhich would Waitress would then internally set to `Content-Lenght: 0`.\n\nWaitress would then treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining.\n\n### Patches\n\nThis issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. \n\nThe Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior.\n\n### Workarounds\n\nVarious reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method).\n\n### Issues/more security issues:\n\n* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)\n* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)",
911
"severity": [],
@@ -33,6 +35,10 @@
3335
"type": "WEB",
3436
"url": "https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6"
3537
},
38+
{
39+
"type": "ADVISORY",
40+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16792"
41+
},
3642
{
3743
"type": "WEB",
3844
"url": "https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65"
@@ -46,12 +52,16 @@
4652
"url": "https://github.com/Pylons/waitress"
4753
},
4854
{
49-
"type": "ADVISORY",
50-
"url": "https://github.com/advisories/GHSA-j7j6-7hfx-5522"
55+
"type": "WEB",
56+
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2020-178.yaml"
5157
},
5258
{
5359
"type": "WEB",
54-
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2020-178.yaml"
60+
"url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
5565
}
5666
],
5767
"database_specific": {

advisories/github-reviewed/2022/05/GHSA-j7j6-7hfx-5522/GHSA-j7j6-7hfx-5522.json

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j7j6-7hfx-5522",
4-
"modified": "2022-06-27T16:10:41Z",
4+
"modified": "2026-01-22T22:34:03Z",
55
"published": "2022-05-24T17:07:06Z",
6-
"aliases": [
7-
"CVE-2019-16792"
8-
],
9-
"summary": "Inconsistent Interpretation of HTTP Requests in Waitress",
10-
"details": "Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.",
6+
"withdrawn": "2026-01-22T22:34:03Z",
7+
"aliases": [],
8+
"summary": "Duplicate Advisory: Inconsistent Interpretation of HTTP Requests in Waitress",
9+
"details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-36p8-mvp6-cv38. This link is maintained to preserve external references.\n\n## Original Description\nWaitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.",
1110
"severity": [
1211
{
1312
"type": "CVSS_V3",
Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vqxh-445g-37fc",
4+
"modified": "2026-01-22T22:33:22Z",
5+
"published": "2026-01-22T21:33:47Z",
6+
"aliases": [
7+
"CVE-2025-22234"
8+
],
9+
"summary": "Spring Security has a broken timing attack mitigation implemented in DaoAuthenticationProvide",
10+
"details": "The fix applied in CVE-2025-22228 inadvertently broke the timing attack mitigation implemented in DaoAuthenticationProvider. This can allow attackers to infer valid usernames or other authentication behavior via response-time differences under certain configurations.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.springframework.security:spring-security-core"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "6.3.8"
29+
},
30+
{
31+
"fixed": "6.3.9"
32+
}
33+
]
34+
}
35+
],
36+
"versions": [
37+
"6.3.8"
38+
]
39+
},
40+
{
41+
"package": {
42+
"ecosystem": "Maven",
43+
"name": "org.springframework.security:spring-security-core"
44+
},
45+
"ranges": [
46+
{
47+
"type": "ECOSYSTEM",
48+
"events": [
49+
{
50+
"introduced": "6.4.4"
51+
},
52+
{
53+
"fixed": "6.4.5"
54+
}
55+
]
56+
}
57+
],
58+
"versions": [
59+
"6.4.4"
60+
]
61+
}
62+
],
63+
"references": [
64+
{
65+
"type": "ADVISORY",
66+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22234"
67+
},
68+
{
69+
"type": "PACKAGE",
70+
"url": "https://github.com/spring-projects/spring-security"
71+
},
72+
{
73+
"type": "WEB",
74+
"url": "https://spring.io/security/cve-2025-22234"
75+
}
76+
],
77+
"database_specific": {
78+
"cwe_ids": [
79+
"CWE-208"
80+
],
81+
"severity": "MODERATE",
82+
"github_reviewed": true,
83+
"github_reviewed_at": "2026-01-22T22:33:22Z",
84+
"nvd_published_at": "2026-01-22T21:15:49Z"
85+
}
86+
}

advisories/unreviewed/2026/01/GHSA-vqxh-445g-37fc/GHSA-vqxh-445g-37fc.json

Lines changed: 0 additions & 36 deletions
This file was deleted.

0 commit comments

Comments
 (0)