fkie_cve-2020-15049
Vulnerability from fkie_nvd
Published
2020-06-30 18:15
Modified
2024-11-21 05:04
Severity ?
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
squid-cache | squid | * | |
squid-cache | squid | * | |
squid-cache | squid | * | |
squid-cache | squid | * | |
squid-cache | squid | 2.7 | |
squid-cache | squid | 2.7 | |
squid-cache | squid | 2.7 | |
squid-cache | squid | 2.7 | |
squid-cache | squid | 2.7 | |
squid-cache | squid | 2.7 | |
squid-cache | squid | 2.7 | |
squid-cache | squid | 2.7 | |
squid-cache | squid | 2.7 | |
fedoraproject | fedora | 31 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", matchCriteriaId: "357FB8EB-55D7-40D8-918A-F8F2C1B6182A", versionEndIncluding: "2.6", versionStartIncluding: "2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", matchCriteriaId: "E3828B8E-1FF7-4707-BB24-6C7CABC37362", versionEndIncluding: "3.5.28", versionStartIncluding: "3.1", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", matchCriteriaId: "C3430B4A-4E1E-438D-9C84-4CFED6A3F023", versionEndExcluding: "4.12", versionStartIncluding: "4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", matchCriteriaId: "137B599B-80D1-4903-8791-40F11BC3FCD9", versionEndExcluding: "5.0.3", versionStartIncluding: "5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:2.7:*:*:*:*:*:*:*", matchCriteriaId: "35C30CB9-FA3A-408D-A8B0-8805E75657BE", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:*", matchCriteriaId: "EFBB466C-C679-4B4B-87C2-E7853E5B3F04", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*", matchCriteriaId: "A03692DD-779F-4E3C-861C-29943870A816", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*", matchCriteriaId: "79FF6B3C-A3CE-4AA2-80F9-44D05A6B2F08", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:*", matchCriteriaId: "3CF6E367-D33B-4B60-8C40-4618C47D53E8", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:*", matchCriteriaId: "0FA1F4FE-629C-4489-A13C-017A824C840F", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:*", matchCriteriaId: "2479C5BF-94E1-4153-9FA3-333BC00F01D6", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:*", matchCriteriaId: "8ABFCCCC-7584-466E-97CC-6EBD3934A70E", vulnerable: true, }, { criteria: "cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:*", matchCriteriaId: "F17E49BF-FB11-4EE6-B6AC-30914F381B2F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing \"+\\ \"-\" or an uncommon shell whitespace character prefix to the length field-value.", }, { lang: "es", value: "Se detectó un problema en el archivo http/ContentLengthInterpreter.cc en Squid versiones anteriores a 4.12 y versiones 5.x anteriores a 5.0.3. Un ataque de Trafico No Autorizado de Peticiones y Envenenamiento puede tener éxito contra la memoria caché HTTP. El cliente envía una petición HTTP con un encabezado Content-Length que contiene \"+\\\"-\" o un prefijo del carácter espacio en blanco de shell poco común en el valor de campo de longitud", }, ], id: "CVE-2020-15049", lastModified: "2024-11-21T05:04:41.830", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 6, source: "cve@mitre.org", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-30T18:15:12.367", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/", }, { source: "cve@mitre.org", url: "https://security.netapp.com/advisory/ntap-20210312-0001/", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/4551-1/", }, { source: "cve@mitre.org", url: "https://www.debian.org/security/2020/dsa-4732", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20210312-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/4551-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2020/dsa-4732", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-444", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.