Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-25097

Опубликовано: 04 сент. 2020
Источник: redhat
CVSS3: 8.6

Описание

An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.

A flaw was found in squid. Due to improper validation while parsing the request URI, squid is vulnerable to HTTP request smuggling. This issue could allow a trusted client to perform an HTTP request smuggling attack and access services otherwise forbidden by squid. The highest threat from this vulnerability is to data confidentiality.

Отчет

This flaw is not tied to a specific proxy type (e.g., forward or reverse) and has been rated as having a security impact of Important. This flaw affects the versions of Squid as shipped with Red Hat Enterprise Linux 7 and 8, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Extended Life Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Меры по смягчению последствий

This flaw can be mitigated by setting the uri_whitespace directive in squid.conf to either:

uri_whitespace deny

or

uri_whitespace encode

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6squidOut of support scope
Red Hat Enterprise Linux 6squid34Out of support scope
Red Hat Enterprise Linux 9squidNot affected
Red Hat Enterprise Linux 7squidFixedRHSA-2021:113508.04.2021
Red Hat Enterprise Linux 8squidFixedRHSA-2021:197918.05.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportsquidFixedRHSA-2021:202519.05.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportsquidFixedRHSA-2021:202519.05.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1939925squid: improper input validation may allow a trusted client to perform HTTP request smuggling

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 4 лет назад

An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.

CVSS3: 8.6
nvd
больше 4 лет назад

An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.

CVSS3: 8.6
debian
больше 4 лет назад

An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. D ...

rocky
почти 4 года назад

Important: squid:4 security update

oracle-oval
около 4 лет назад

ELSA-2021-1979: squid:4 security update (IMPORTANT)

8.6 High

CVSS3

Уязвимость CVE-2020-25097