Your submission was sent successfully! Close

CVE-2019-12524

Published: 15 April 2020

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
squid
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Not vulnerable
(4.8-1ubuntu2.2)
focal Not vulnerable
(4.10-1ubuntu1)
groovy Not vulnerable
(4.10-1ubuntu1)
hirsute Not vulnerable
(4.10-1ubuntu1)
precise Does not exist

trusty Does not exist

upstream
Released (4.8)
xenial Does not exist

squid3
Launchpad, Ubuntu, Debian
bionic
Released (3.5.27-1ubuntu1.7)
eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

precise Ignored
(end of ESM support, was needs-triage)
trusty Does not exist

upstream Needs triage

xenial Not vulnerable
(code not present)