Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-19107

Опубликовано: 27 окт. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-19107: squid:4 security update (IMPORTANT)

libecap squid [7:4.15-10.9]

  • Resolves: RHEL-122484 - squid: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

Module squid:4 is enabled

libecap

1.0.1-2.module+el8.9.0+90083+f7556140

libecap-devel

1.0.1-2.module+el8.9.0+90083+f7556140

squid

4.15-10.module+el8.10.0+90691+00cd6d19.9

Oracle Linux x86_64

Module squid:4 is enabled

libecap

1.0.1-2.module+el8.9.0+90083+f7556140

libecap-devel

1.0.1-2.module+el8.9.0+90083+f7556140

squid

4.15-10.module+el8.10.0+90691+00cd6d19.9

Связанные CVE

Связанные уязвимости

CVSS3: 10
ubuntu
17 дней назад

Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.

CVSS3: 10
nvd
17 дней назад

Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.

CVSS3: 10
msrc
16 дней назад

Squid vulnerable to information disclosure via authentication credential leakage in error handling

CVSS3: 10
debian
17 дней назад

Squid is a caching proxy for the Web. In Squid versions prior to 7.2, ...

suse-cvrf
3 дня назад

Security update for squid