Количество 14
Количество 14
CVE-2020-15811
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
CVE-2020-15811
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
CVE-2020-15811
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
CVE-2020-15811
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ...
BDU:2020-04148
Уязвимость прокси-сервера Squid, связанная с непринятием мер по обработке последовательностей CRLF в HTTP-заголовках, позволяющая нарушителю внедрить произвольные HTTP-заголовки
RLSA-2020:3623
Important: squid:4 security update
ELSA-2020-3623
ELSA-2020-3623: squid:4 security update (IMPORTANT)
SUSE-SU-2020:2471-1
Security update for squid
SUSE-SU-2020:14590-1
Security update for squid3
openSUSE-SU-2020:1369-1
Security update for squid
openSUSE-SU-2020:1346-1
Security update for squid
SUSE-SU-2020:2443-1
Security update for squid
SUSE-SU-2020:2442-1
Security update for squid
ELSA-2020-4082
ELSA-2020-4082: squid security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-15811 An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches. | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-15811 An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches. | CVSS3: 9.6 | 0% Низкий | больше 5 лет назад | |
CVE-2020-15811 An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches. | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-15811 An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ... | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
BDU:2020-04148 Уязвимость прокси-сервера Squid, связанная с непринятием мер по обработке последовательностей CRLF в HTTP-заголовках, позволяющая нарушителю внедрить произвольные HTTP-заголовки | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
RLSA-2020:3623 Important: squid:4 security update | больше 5 лет назад | |||
ELSA-2020-3623 ELSA-2020-3623: squid:4 security update (IMPORTANT) | больше 5 лет назад | |||
SUSE-SU-2020:2471-1 Security update for squid | больше 5 лет назад | |||
SUSE-SU-2020:14590-1 Security update for squid3 | почти 5 лет назад | |||
openSUSE-SU-2020:1369-1 Security update for squid | больше 5 лет назад | |||
openSUSE-SU-2020:1346-1 Security update for squid | больше 5 лет назад | |||
SUSE-SU-2020:2443-1 Security update for squid | больше 5 лет назад | |||
SUSE-SU-2020:2442-1 Security update for squid | больше 5 лет назад | |||
ELSA-2020-4082 ELSA-2020-4082: squid security update (IMPORTANT) | около 5 лет назад |
Уязвимостей на страницу