File tree 2 files changed +27
-1
lines changed
2 files changed +27
-1
lines changed Original file line number Diff line number Diff line change
1
+ 2.1.1
2
+ -----
3
+
4
+ Security Bugfix
5
+ ~~~~~~~~~~~~~~~
6
+
7
+ - Waitress now validates that chunked encoding extensions are valid, and don't
8
+ contain invalid characters that are not allowed. They are still skipped/not
9
+ processed, but if they contain invalid data we no longer continue in and
10
+ return a 400 Bad Request. This stops potential HTTP desync/HTTP request
11
+ smuggling. Thanks to Zhang Zeyu for reporting this issue. See
12
+ https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
13
+
14
+ - Waitress now validates that the chunk length is only valid hex digits when
15
+ parsing chunked encoding, and values such as ``0x01`` and ``+01`` are no
16
+ longer supported. This stops potential HTTP desync/HTTP request smuggling.
17
+ Thanks to Zhang Zeyu for reporting this issue. See
18
+ https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
19
+
20
+ - Waitress now validates that the Content-Length sent by a remote contains only
21
+ digits in accordance with RFC7230 and will return a 400 Bad Request when the
22
+ Content-Length header contains invalid data, such as ``+10`` which would
23
+ previously get parsed as ``10`` and accepted. This stops potential HTTP
24
+ desync/HTTP request smuggling Thanks to Zhang Zeyu for reporting this issue. See
25
+ https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
26
+
1
27
2.1.0
2
28
-----
3
29
Original file line number Diff line number Diff line change 1
1
[metadata]
2
2
name = waitress
3
- version = 2.1.0
3
+ version = 2.1.1
4
4
description = Waitress WSGI server
5
5
long_description = file: README.rst, CHANGES.txt
6
6
long_description_content_type = text/x-rst
You can’t perform that action at this time.
0 commit comments