CVE-2020-15811

Name
CVE-2020-15811
Description
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory https://www.debian.org/security/2020/dsa-4751
Patch https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv
Third Party Advisory https://usn.ubuntu.com/4477-1/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/
Third Party Advisory https://usn.ubuntu.com/4551-1/
Mailing List https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20210219-0007/
Third Party Advisory https://security.netapp.com/advisory/ntap-20210226-0006/
Third Party Advisory https://security.netapp.com/advisory/ntap-20210226-0007/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* squid >= None < 4.13
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* squid >= 5.0 < 5.0.4

Vulnerable and fixed packages

Source package Branch Version Maintainer Status