Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Invalid whitespace continued #277

Merged
merged 3 commits into from Jan 2, 2020
Merged

Conversation

digitalresistor
Copy link
Member

This is a follow-up to existing security issue: GHSA-m5ff-3wj3-8ph4

This makes sure that we don't accidentally strip more than we should from a header value before comparison which could have opened Waitress up to treating the request different from a potential front-end.

While here, tighten up the RFC7230 regex I wrote to match the errata that was published.

Continuation/follow-up for:
GHSA-m5ff-3wj3-8ph4
which showcased the initial problem with the way that waitress was
dealing with whitespace in headers.

Additional testing by ZeddYu Lu also led to other potential issues with
non-printable ascii characters that are stripped by default by Python's
string.strip() function
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants