File tree Expand file tree Collapse file tree 2 files changed +27
-1
lines changed
Expand file tree Collapse file tree 2 files changed +27
-1
lines changed Original file line number Diff line number Diff line change 1+ 2.1.1
2+ -----
3+
4+ Security Bugfix
5+ ~~~~~~~~~~~~~~~
6+
7+ - Waitress now validates that chunked encoding extensions are valid, and don't
8+ contain invalid characters that are not allowed. They are still skipped/not
9+ processed, but if they contain invalid data we no longer continue in and
10+ return a 400 Bad Request. This stops potential HTTP desync/HTTP request
11+ smuggling. Thanks to Zhang Zeyu for reporting this issue. See
12+ https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
13+
14+ - Waitress now validates that the chunk length is only valid hex digits when
15+ parsing chunked encoding, and values such as ``0x01`` and ``+01`` are no
16+ longer supported. This stops potential HTTP desync/HTTP request smuggling.
17+ Thanks to Zhang Zeyu for reporting this issue. See
18+ https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
19+
20+ - Waitress now validates that the Content-Length sent by a remote contains only
21+ digits in accordance with RFC7230 and will return a 400 Bad Request when the
22+ Content-Length header contains invalid data, such as ``+10`` which would
23+ previously get parsed as ``10`` and accepted. This stops potential HTTP
24+ desync/HTTP request smuggling Thanks to Zhang Zeyu for reporting this issue. See
25+ https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
26+
1272.1.0
228-----
329
Original file line number Diff line number Diff line change 11[metadata]
22name = waitress
3- version = 2.1.0
3+ version = 2.1.1
44description = Waitress WSGI server
55long_description = file: README.rst, CHANGES.txt
66long_description_content_type = text/x-rst
You can’t perform that action at this time.
0 commit comments