CVE-2020-15049

Priority
Description
An issue was discovered in http/ContentLengthInterpreter.cc in Squid before
4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can
succeed against the HTTP cache. The client sends an HTTP request with a
Content-Length header containing "+\ "-" or an uncommon shell whitespace
character prefix to the length field-value.
Assigned-to
mdeslaur
Notes
mdeslaurper upstream, "This attack requires an upstream server to
participate in the smuggling and generate the poison response
sequence."
Package
Source: squid (LP Ubuntu Debian)
Upstream:released (4.12)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 20.04 LTS (Focal Fossa):needed
Ubuntu 20.10 (Groovy Gorilla):released (4.12-1ubuntu1)
Patches:
Upstream:http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (3.5.12-1ubuntu7.15)
Ubuntu 18.04 LTS (Bionic Beaver):released (3.5.27-1ubuntu1.9)
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
More Information

Updated: 2020-09-28 20:26:04 UTC (commit 2cfd58150572cb53bc7d970ca383a66bfd44273c)