Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-18678

Опубликовано: 26 нояб. 2019
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5
CVSS3: 5.3

Описание

An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.

РелизСтатусПримечание
bionic

DNE

devel

released

4.9-2ubuntu1
disco

released

4.4-1ubuntu2.3
eoan

released

4.8-1ubuntu2.1
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

4.9-2ubuntu1
focal

released

4.9-2ubuntu1
groovy

released

4.9-2ubuntu1
hirsute

released

4.9-2ubuntu1
precise/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

released

3.5.27-1ubuntu1.4
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

3.5.27-1ubuntu1.4
esm-infra/focal

DNE

esm-infra/xenial

not-affected

3.5.12-1ubuntu7.9
focal

DNE

groovy

DNE

Показывать по

EPSS

Процентиль: 94%
0.12526
Средний

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
redhat
больше 5 лет назад

An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.

CVSS3: 5.3
nvd
больше 5 лет назад

An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.

CVSS3: 5.3
debian
больше 5 лет назад

An issue was discovered in Squid 3.x and 4.x through 4.8. It allows at ...

github
около 3 лет назад

An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.

fstec
больше 5 лет назад

Уязвимость заголовка запросов прокси-сервера Squid, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 94%
0.12526
Средний

5 Medium

CVSS2

5.3 Medium

CVSS3

Уязвимость CVE-2019-18678