漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress
漏洞信息
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.
漏洞信息
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
漏洞
HTTP请求的解释不一致性(HTTP请求私运)
漏洞
Waitress 环境问题漏洞
漏洞信息
Waitress是一款用于Python的WSGI(Web服务器网关接口)服务器。 Waitress 1.3.1及之前版本中存在环境问题漏洞,该漏洞源于程序没有正确解析Transfer-Encoding标头。远程攻击者可借助特制请求利用该漏洞造成HTTP请求走私。
漏洞信息
N/A
漏洞
N/A