CVE-2019-12524
Published: 15 April 2020
An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.
Notes
Author | Note |
---|---|
mdeslaur | fixed in Debian's 3.5.23-5+deb9u2 same patch as CVE-2019-12520 |
Priority
Status
Package | Release | Status |
---|---|---|
squid Launchpad, Ubuntu, Debian |
groovy |
Not vulnerable
(4.10-1ubuntu1)
|
bionic |
Does not exist
|
|
eoan |
Not vulnerable
(4.8-1ubuntu2.2)
|
|
focal |
Not vulnerable
(4.10-1ubuntu1)
|
|
hirsute |
Not vulnerable
(4.10-1ubuntu1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.8)
|
|
xenial |
Does not exist
|
|
Patches: upstream: http://www.squid-cache.org/Versions/v4/changesets/SQUID-2019_4.patch |
||
squid3 Launchpad, Ubuntu, Debian |
groovy |
Does not exist
|
bionic |
Released
(3.5.27-1ubuntu1.7)
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
hirsute |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(code not present)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |