Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-12523

Опубликовано: 05 нояб. 2019
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.

Меры по смягчению последствий

Access to manager services can be prevented by enabling the Via header: (in /etc/squid/squid.conf)

via on

There are no reliable workarounds to prevent access to restricted upstream servers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5squidNot affected
Red Hat Enterprise Linux 6squidOut of support scope
Red Hat Enterprise Linux 6squid34Out of support scope
Red Hat Enterprise Linux 7squidWill not fix
Red Hat Enterprise Linux 8squidFixedRHSA-2020:474304.11.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1770371squid: Improper input validation in URI processor

EPSS

Процентиль: 72%
0.00728
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 5 лет назад

An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.

CVSS3: 9.1
nvd
больше 5 лет назад

An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.

CVSS3: 9.1
debian
больше 5 лет назад

An issue was discovered in Squid before 4.9. When handling a URN reque ...

CVSS3: 9.1
github
около 3 лет назад

An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.

CVSS3: 9.1
fstec
больше 5 лет назад

Уязвимость прокси-сервера Squid, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю получить доступ к ограниченным HTTP-серверам

EPSS

Процентиль: 72%
0.00728
Низкий

7.4 High

CVSS3