5.3
CVSSv3

CVE-2019-18678

Published: 26/11/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

An issue exists in Squid 3.x and 4.x up to and including 4.8. It allows malicious users to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

squid-cache squid

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 19.04

canonical ubuntu linux 19.10

debian debian linux 8.0

fedoraproject fedora 30

fedoraproject fedora 31

Vendor Advisories

Synopsis Moderate: squid:4 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for the squid:4 module is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability ...
Several security issues were fixed in Squid ...
Multiple security issues were discovered in the Squid proxy caching server, which could result in the bypass of security filters, information disclosure, the execution of arbitrary code or denial of service For the stable distribution (buster), these problems have been fixed in version 46-1+deb10u2 We recommend that you upgrade your squid packag ...
An issue was discovered in Squid before 49 When handling a URN request, a corresponding HTTP request is made This HTTP request doesn't go through the access checks that incoming HTTP requests go through This causes all access checks to be bypassed and allows access to restricted HTTP servers, eg, an attacker can connect to HTTP servers that o ...
Due to a buffer overflow bug Squid is vulnerable to a Denial of Service attack against HTTP Digest Authentication An issue was discovered in Squid through 47 When handling requests from users, Squid checks its rules to see if the request should be denied Squid by default comes with rules to block access to the Cache Manager, which serves detaile ...
A HTTP request splitting issue has been found in Squid before 49 This issue allows attackers to smuggle HTTP requests through frontend software to a Squid which splits the HTTP Request pipeline differently The resulting Response messages corrupt caches between client and Squid with attacker controlled content at arbitrary URLs ...