CVE-2020-15811Incorrect Comparison in Squid

Severity
6.5MEDIUMNVD
EPSS
0.3%
top 51.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 2
Latest updateSep 28

Description

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacke

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

NVDsquid-cache/squid5.05.0.4+1
Debiansquid/squid< 4.13-1+3
Ubuntusquid/squid< 4.10-1ubuntu1.2
NVDopensuse/leap15.1, 15.2+1

Also affects: Debian Linux 10.0, 9.0, Fedora 31, 32, 33, Ubuntu Linux 16.04, 18.04, 20.04

Patches

🔴Vulnerability Details

4
OSV
squid3 vulnerabilities2020-09-28
OSV
CVE-2020-15811: An issue was discovered in Squid before 42020-09-02
CVEList
CVE-2020-15811: An issue was discovered in Squid before 42020-09-02
OSV
squid vulnerabilities2020-08-27

📋Vendor Advisories

4
Ubuntu
Squid vulnerabilities2020-09-28
Ubuntu
Squid vulnerabilities2020-08-27
Red Hat
squid: HTTP Request Splitting could result in cache poisoning2020-08-23
Debian
CVE-2020-15811: squid - An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorr...2020

💬Community

3
Bugzilla
CVE-2020-15811 squid: HTTP Request Splitting could result in cache poisoning2020-08-24
Bugzilla
CVE-2020-15811 squid: HTTP Request Splitting could result in cache poisoning [fedora-all]2020-08-24
Bugzilla
CVE-2020-15811 squid: HTTP Request Splitting could result in cache poisoning [fedora-all]2020-08-24
CVE-2020-15811 — Incorrect Comparison in Squid | cvebase