The patches introduced to fix https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 were not complete and still would allow an attacker to smuggle requests/split a HTTP request with invalid data.
This updates the existing CVE with ID: CVE-2019-16789
Waitress version 1.4.2 has been updated to now validate HTTP headers better to avoid the issue, completely fixing all known issues with whitespace.
There are no work-arounds, upgrading to Waitress 1.4.2 is highly recommended.
See https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 for more information on the security issue.
If you have any questions or comments about this advisory:
access.redhat.com/errata/RHSA-2020:0720
docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes
github.com/github/advisory-review/pull/14604
github.com/Pylons/waitress/commit/ddb65b489d01d696afa1695b75fdd5df3e4ffdf8
github.com/Pylons/waitress/security/advisories/GHSA-968f-66r5-5v74
lists.debian.org/debian-lts-announce/2022/05/msg00011.html
lists.fedoraproject.org/archives/list/[email protected]/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7
lists.fedoraproject.org/archives/list/[email protected]/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5
nvd.nist.gov/vuln/detail/CVE-2019-16789
www.oracle.com/security-alerts/cpuapr2022.html