CVE-2019-12524Missing Authentication for Critical Function in Squid

Severity
9.8CRITICALNVD
EPSS
0.5%
top 32.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 15
Latest updateMay 24

Description

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resour

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

Debiansquid/squid< 4.8-1+3

Also affects: Debian Linux 10.0, 9.0, Ubuntu Linux 16.04, 18.04

🔴Vulnerability Details

4
GHSA
GHSA-wwv6-9vqw-fwxx: An issue was discovered in Squid through 42022-05-24
OSV
squid3 vulnerabilities2020-08-03
OSV
CVE-2019-12524: An issue was discovered in Squid through 42020-04-15
CVEList
CVE-2019-12524: An issue was discovered in Squid through 42020-04-15

📋Vendor Advisories

3
Ubuntu
Squid vulnerabilities2020-08-03
Red Hat
squid: Improper access restriction in url_regex may lead to security bypass2020-04-24
Debian
CVE-2019-12524: squid - An issue was discovered in Squid through 4.7. When handling requests from users,...2019

💬Community

2
HackerOne
Cache Poisoning2021-08-26
Bugzilla
CVE-2019-12524 squid: Improper access restriction in url_regex may lead to security bypass2020-04-24
CVE-2019-12524 — Squid-cache Squid vulnerability | cvebase