CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
81.0%
An issue was discovered in Squid 3.x and 4.x through 4.8. It allows
attackers to smuggle HTTP requests through frontend software to a Squid
instance that splits the HTTP Request pipeline differently. The resulting
Response messages corrupt caches (between a client and Squid) with
attacker-controlled content at arbitrary URLs. Effects are isolated to
software between the attacker client and Squid. There are no effects on
Squid itself, nor on any upstream servers. The issue is related to a
request header containing whitespace between a header name and a colon.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 19.04 | noarch | squid | < 4.4-1ubuntu2.3 | UNKNOWN |
ubuntu | 19.10 | noarch | squid | < 4.8-1ubuntu2.1 | UNKNOWN |
ubuntu | 20.04 | noarch | squid | < 4.9-2ubuntu1 | UNKNOWN |
ubuntu | 20.10 | noarch | squid | < 4.9-2ubuntu1 | UNKNOWN |
ubuntu | 21.04 | noarch | squid | < 4.9-2ubuntu1 | UNKNOWN |
ubuntu | 18.04 | noarch | squid3 | < 3.5.27-1ubuntu1.4 | UNKNOWN |
ubuntu | 16.04 | noarch | squid3 | < 3.5.12-1ubuntu7.9 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
81.0%