CVE-2019-18678

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.

References

http://www.squid-cache.org/Advisories/SQUID-2019_10.txt

http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch

https://bugzilla.suse.com/show_bug.cgi?id=1156323

https://github.com/squid-cache/squid/pull/445

https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html

https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/

https://lists.fedoraproject.org/archives/list/[email protected]/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/

https://security.gentoo.org/glsa/202003-34

https://usn.ubuntu.com/4213-1/

https://www.debian.org/security/2020/dsa-4682

Details

Source: MITRE

Published: 2019-11-26

Updated: 2020-07-11

Type: CWE-444

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 5.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Impact Score: 1.4

Exploitability Score: 3.9

Severity: MEDIUM

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
150657SUSE SLES11 Security Update : squid3 (SUSE-SU-2020:14460-1)NessusSuSE Local Security Checks
high
112694Squid < 4.9 Multiple VulnerabilitiesWeb Application ScanningComponent Vulnerability
critical
145969CentOS 8 : squid:4 (CESA-2020:4743)NessusCentOS Local Security Checks
high
142412RHEL 8 : squid:4 (RHSA-2020:4743)NessusRed Hat Local Security Checks
high
136430Debian DSA-4682-1 : squid - security updateNessusDebian Local Security Checks
high
134640GLSA-202003-34 : Squid: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
134561SUSE SLES12 Security Update : squid (SUSE-SU-2020:0661-1)NessusSuSE Local Security Checks
high
133934EulerOS 2.0 SP5 : squid (EulerOS-SA-2020-1133)NessusHuawei Local Security Checks
critical
132627EulerOS 2.0 SP8 : squid (EulerOS-SA-2020-1034)NessusHuawei Local Security Checks
critical
131961Debian DLA-2028-1 : squid3 security updateNessusDebian Local Security Checks
critical
131723Ubuntu 16.04 LTS / 18.04 LTS / 19.04 / 19.10 : squid, squid3 vulnerabilities (USN-4213-1)NessusUbuntu Local Security Checks
critical
131714Fedora 31 : 7:squid (2019-9538783033)NessusFedora Local Security Checks
critical
131707Fedora 30 : 7:squid (2019-0b16cbdd0e)NessusFedora Local Security Checks
critical
131386SUSE SLES12 Security Update : squid (SUSE-SU-2019:3067-1)NessusSuSE Local Security Checks
critical
131220openSUSE Security Update : squid (openSUSE-2019-2541)NessusSuSE Local Security Checks
critical
131219openSUSE Security Update : squid (openSUSE-2019-2540)NessusSuSE Local Security Checks
critical
131070SUSE SLES15 Security Update : squid (SUSE-SU-2019:2975-1)NessusSuSE Local Security Checks
critical