Your submission was sent successfully! Close


Published: 15 April 2020

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.



CVSS 3 base score: 9.8


Package Release Status
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Not vulnerable
focal Not vulnerable
groovy Not vulnerable
hirsute Not vulnerable
precise Does not exist

trusty Does not exist

Released (4.8)
xenial Does not exist

Launchpad, Ubuntu, Debian
Released (3.5.27-1ubuntu1.7)
eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

precise Ignored
(end of ESM support, was needs-triage)
trusty Does not exist

upstream Needs triage

xenial Not vulnerable
(code not present)