CVE-2020-25097 Information
Share on:Description
An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Reference
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_11.patch http://www.squid-cache.org/Versions/v5/changesets/SQUID-2020_11.patch https://github.com/squid-cache/squid/security/advisories/GHSA-jvf6-h9gj-pmj6 https://www.debian.org/security/2021/dsa-4873 https://lists.fedoraproject.org/archives/list/[email protected]/message/DJMDRVV677AJL4BZAOLCT5LMFCGBZTC2/ https://lists.fedoraproject.org/archives/list/[email protected]/message/FBXFWKIGXPERDVQXG556LLPUOCMQGERC/ https://lists.fedoraproject.org/archives/list/[email protected]/message/O3RYBDMJCPYGOSURWDR3WJTE474UFT77/ https://security.gentoo.org/glsa/202105-14 https://security.netapp.com/advisory/ntap-20210727-0010/
Attack Complexity
LOW
Privileges Required
NONE
User Interaction Required
NONE
Scope
NONE
Confidentiality Impact
CHANGED
Integrity Impact
HIGH
Availability Impact
NONE
Base Score
NONE
Base Severity
8.6