CVE-2020-15049HTTP Request Smuggling in Squid

Severity
8.8HIGHNVD
CNA9.9
EPSS
15.7%
top 5.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 30
Latest updateMar 29

Description

An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

NVDsquid-cache/squid4.04.12+4
Debiansquid/squid< 4.12-1+3
Ubuntusquid/squid< 4.10-1ubuntu1.3

Also affects: Fedora 31

Patches

🔴Vulnerability Details

4
OSV
squid, squid3 vulnerabilities2021-03-29
OSV
squid3 vulnerabilities2020-09-28
CVEList
CVE-2020-15049: An issue was discovered in http/ContentLengthInterpreter2020-06-30
OSV
CVE-2020-15049: An issue was discovered in http/ContentLengthInterpreter2020-06-30

📋Vendor Advisories

4
Ubuntu
Squid vulnerabilities2021-03-29
Ubuntu
Squid vulnerabilities2020-09-28
Red Hat
squid: Request smuggling and poisoning attack against the HTTP cache2020-06-26
Debian
CVE-2020-15049: squid - An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12...2020

💬Community

2
Bugzilla
CVE-2020-15049 squid: Request smuggling and poisoning attack against the HTTP cache2020-06-30
Bugzilla
CVE-2020-15049 squid: request smuggling and poisoning attack against the HTTP cache [fedora-all]2020-06-30
CVE-2020-15049 — HTTP Request Smuggling in Squid | cvebase