An issue exists in http/ContentLengthInterpreter.cc in Squid prior to 4.12 and 5.x prior to 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
squid-cache squid 2.7 |
||
squid-cache squid |
||
fedoraproject fedora 31 |