Логотип exploitDog
bind:CVE-2020-15811
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15811

Количество 14

Количество 14

ubuntu логотип

CVE-2020-15811

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2020-15811

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 9.6
EPSS: Низкий
nvd логотип

CVE-2020-15811

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2020-15811

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ...

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2020-04148

почти 5 лет назад

Уязвимость прокси-сервера Squid, связанная с непринятием мер по обработке последовательностей CRLF в HTTP-заголовках, позволяющая нарушителю внедрить произвольные HTTP-заголовки

CVSS3: 6.5
EPSS: Низкий
rocky логотип

RLSA-2020:3623

почти 5 лет назад

Important: squid:4 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2020-3623

почти 5 лет назад

ELSA-2020-3623: squid:4 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2471-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14590-1

больше 4 лет назад

Security update for squid3

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1369-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1346-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2443-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2442-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
oracle-oval логотип

ELSA-2020-4082

больше 4 лет назад

ELSA-2020-4082: squid security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-15811

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-15811

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 9.6
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2020-15811

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-15811

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ...

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
fstec логотип
BDU:2020-04148

Уязвимость прокси-сервера Squid, связанная с непринятием мер по обработке последовательностей CRLF в HTTP-заголовках, позволяющая нарушителю внедрить произвольные HTTP-заголовки

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
rocky логотип
RLSA-2020:3623

Important: squid:4 security update

почти 5 лет назад
oracle-oval логотип
ELSA-2020-3623

ELSA-2020-3623: squid:4 security update (IMPORTANT)

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2471-1

Security update for squid

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14590-1

Security update for squid3

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1369-1

Security update for squid

почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1346-1

Security update for squid

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2443-1

Security update for squid

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2442-1

Security update for squid

почти 5 лет назад
oracle-oval логотип
ELSA-2020-4082

ELSA-2020-4082: squid security update (IMPORTANT)

больше 4 лет назад

Уязвимостей на страницу