An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_11.patch
http://www.squid-cache.org/Versions/v5/changesets/SQUID-2020_11.patch
https://github.com/squid-cache/squid/security/advisories/GHSA-jvf6-h9gj-pmj6
https://www.debian.org/security/2021/dsa-4873
Source: MITRE
Published: 2021-03-19
Updated: 2022-04-05
Type: CWE-20
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Impact Score: 4
Exploitability Score: 3.9
Severity: HIGH