Описание
Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 3.5.12-1ubuntu6 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
| esm-infra/xenial | released | 3.5.12-1ubuntu6 |
| precise | ignored | |
| trusty | ignored | |
| trusty/esm | DNE | trusty was ignored |
| upstream | released | 3.5.6-1 |
| utopic | ignored | end of life |
| vivid | ignored | end of life |
| vivid/stable-phone-overlay | DNE |
Показывать по
6.8 Medium
CVSS2
Связанные уязвимости
Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
Squid before 3.5.6 does not properly handle CONNECT method peer respon ...
Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
Уязвимость прокси-сервера Squid, позволяющая нарушителю обойти существующие ограничения и получить доступ к серверу
6.8 Medium
CVSS2