ALASSQUID4-2023-009

Related Vulnerabilities: CVE-2019-12520   CVE-2019-12524   CVE-2022-41317  

An issue was discovered in Squid through 4.7 and 5. When receiving a request, Squid checks its cache to see if it can serve up a response. It does this by making a MD5 hash of the absolute URL of the request. If found, it servers the request. The absolute URL can include the decoded UserInfo (username and password) for certain protocols. This decoded info is prepended to the domain. This allows an attacker to provide a username that has special characters to delimit the domain, and treat the rest of the URL as a path or query string. An attacker could first make a request to their domain using an encoded username, then when a request for the target domain comes in that decodes to the exact URL, it will serve the attacker's HTML instead of the real HTML. On Squid servers that also act as reverse proxies, this allows an attacker to gain access to features that only reverse proxies can use, such as ESI. (CVE-2019-12520) An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource. (CVE-2019-12524) A flaw was found in squid. A trusted client can directly access the cache manager information, bypassing the manager ACL protection and resulting in information disclosure. (CVE-2022-41317)

ALASSQUID4-2023-009


Amazon Linux 2 Security Advisory: ALASSQUID4-2023-009
Advisory Release Date: 2023-09-14 04:27 Pacific
Advisory Updated Date: 2023-09-25 21:59 Pacific
Severity: Important

Issue Overview:

An issue was discovered in Squid through 4.7 and 5. When receiving a request, Squid checks its cache to see if it can serve up a response. It does this by making a MD5 hash of the absolute URL of the request. If found, it servers the request. The absolute URL can include the decoded UserInfo (username and password) for certain protocols. This decoded info is prepended to the domain. This allows an attacker to provide a username that has special characters to delimit the domain, and treat the rest of the URL as a path or query string. An attacker could first make a request to their domain using an encoded username, then when a request for the target domain comes in that decodes to the exact URL, it will serve the attacker's HTML instead of the real HTML. On Squid servers that also act as reverse proxies, this allows an attacker to gain access to features that only reverse proxies can use, such as ESI. (CVE-2019-12520)

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource. (CVE-2019-12524)

A flaw was found in squid. A trusted client can directly access the cache manager information, bypassing the manager ACL protection and resulting in information disclosure. (CVE-2022-41317)


Affected Packages:

squid


Issue Correction:
Run yum update squid to update your system.

New Packages:
aarch64:
    squid-4.15-1.amzn2.0.5.aarch64
    squid-debuginfo-4.15-1.amzn2.0.5.aarch64

i686:
    squid-4.15-1.amzn2.0.5.i686
    squid-debuginfo-4.15-1.amzn2.0.5.i686

src:
    squid-4.15-1.amzn2.0.5.src

x86_64:
    squid-4.15-1.amzn2.0.5.x86_64
    squid-debuginfo-4.15-1.amzn2.0.5.x86_64