Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-12524

Опубликовано: 15 апр. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

4.10-1ubuntu1
eoan

not-affected

4.8-1ubuntu2.2
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

4.10-1ubuntu1
focal

not-affected

4.10-1ubuntu1
groovy

not-affected

4.10-1ubuntu1
hirsute

not-affected

4.10-1ubuntu1
precise/esm

DNE

trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

released

3.5.27-1ubuntu1.7
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

3.5.27-1ubuntu1.7
esm-infra/focal

DNE

esm-infra/xenial

not-affected

code not present
focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

EPSS

Процентиль: 77%
0.01122
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 5 лет назад

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.

CVSS3: 9.8
nvd
больше 5 лет назад

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.

CVSS3: 9.8
debian
больше 5 лет назад

An issue was discovered in Squid through 4.7. When handling requests f ...

github
около 3 лет назад

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.

fstec
больше 5 лет назад

Уязвимость прокси-сервера Squid, связанная с отсутствием механизма аутентификации для url_regex, позволяющая нарушителю получить доступ к заблокированному ресурсу

EPSS

Процентиль: 77%
0.01122
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3