VID |
22946 |
Severity |
30 |
Port |
8080,3128 |
Protocol |
TCP |
Class |
Webproxy |
Detailed Description |
According to its banner, the version of Squid running on the remote host is 2.x prior to 4.13 or 5.x prior to 5.0.4. It is,therefore, affected by multiple vulnerabilities:
- An input-validation flaw exists related to handling HTTP and HTTPS traffic that allows HTTP request splitting leading to cache poisoning. (CVE-2020-15810)
- An input-validation flaw exists related to handling HTTP and HTTPS traffic that allows HTTP request smuggling leading to cache poisoning. (CVE-2020-15811)
* References: https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m
* Platforms Affected: National Science Foundation, Squid Web Proxy Cache versions prior to 4.13 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Squid (4.13 or later), available from the Squid Web Proxy Cache Web site at http://www.squid-cache.org/Versions/v3/ |
Related URL |
CVE-2020-15810,CVE-2020-15811 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|