[Debian] CVE: CVE-2022-24761: python3-waitress: Inconsistent Interpretation of HTTP Requests

Bug #2020638 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
hqbai

Bug Description

CVE-2022-24761: https://nvd.nist.gov/vuln/detail/CVE-2022-24761

Base Score: 7.5 HIGH Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.

References:

['python3-waitress_1.4.4-1.1_all.deb===>python3-waitress_1.4.4-1.1+deb11u1_all.deb']

CVE References

Yue Tao (wrytao)
information type: Public → Public Security
tags: added: stx.9.0 stx.security
Changed in starlingx:
status: New → Triaged
importance: Undecided → High
hqbai (hbai)
Changed in starlingx:
assignee: nobody → hqbai (hbai)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tools (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/tools/+/884668

Changed in starlingx:
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tools (master)

Reviewed: https://review.opendev.org/c/starlingx/tools/+/884668
Committed: https://opendev.org/starlingx/tools/commit/d769c1f0fd4aed6381e84ca807814e5ff9beff6d
Submitter: "Zuul (22348)"
Branch: master

commit d769c1f0fd4aed6381e84ca807814e5ff9beff6d
Author: Haiqing Bai <email address hidden>
Date: Tue May 30 11:22:46 2023 +0800

    python3-waitress: fix CVE-2022-24761

    Upgrade python3-waitress to 1.4.4-1.1+deb11u1

    Refer to:
    https://security-tracker.debian.org/tracker/CVE-2022-24761

    Test Plan:
    Pass: downloader -b
    Pass: build-pkgs --clean
    Pass: build-image
    Pass: Jenkins Installation ok
          #dpkg -l | grep python3-waitress
           ii python3-waitress 1.4.4-1.1+deb11u1

    Closes-Bug: 2020638

    Change-Id: I955c96e46bfcc63c7e616c8062f4609660065807
    Signed-off-by: Haiqing Bai <email address hidden>

Changed in starlingx:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.