CVE-2020-15049

An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html
http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch Patch Vendor Advisory
http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch Patch Vendor Advisory
https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/
https://security.netapp.com/advisory/ntap-20210312-0001/
https://usn.ubuntu.com/4551-1/
https://www.debian.org/security/2020/dsa-4732
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html
http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch Patch Vendor Advisory
http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch Patch Vendor Advisory
https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/
https://security.netapp.com/advisory/ntap-20210312-0001/
https://usn.ubuntu.com/4551-1/
https://www.debian.org/security/2020/dsa-4732
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:2.7:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

History

21 Nov 2024, 05:04

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 8.8
v2 : 6.5
v3 : 9.9
References () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html - () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html -
References () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html - () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html -
References () http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch - Patch, Vendor Advisory () http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch - Patch, Vendor Advisory
References () http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch - Patch, Vendor Advisory () http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch - Patch, Vendor Advisory
References () https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5 - Third Party Advisory () https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5 - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html - () https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/ -
References () https://security.netapp.com/advisory/ntap-20210312-0001/ - () https://security.netapp.com/advisory/ntap-20210312-0001/ -
References () https://usn.ubuntu.com/4551-1/ - () https://usn.ubuntu.com/4551-1/ -
References () https://www.debian.org/security/2020/dsa-4732 - () https://www.debian.org/security/2020/dsa-4732 -

07 Nov 2023, 03:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/', 'name': 'FEDORA-2020-cbebc5617e', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/ -

Information

Published : 2020-06-30 18:15

Updated : 2024-11-21 05:04


NVD link : CVE-2020-15049

Mitre link : CVE-2020-15049

CVE.ORG link : CVE-2020-15049


JSON object : View

Products Affected

squid-cache

  • squid

fedoraproject

  • fedora
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')