Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!Close

CVE-2023-46846

Published: 3 November 2023

SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.

Priority

Medium

Cvss 3 Severity Score

5.3

Score breakdown

Status

Package Release Status
squid
Launchpad, Ubuntu, Debian
trusty Ignored
(end of standard support)
xenial Ignored
(end of standard support)
bionic Ignored
(end of standard support)
focal
Released (4.10-1ubuntu1.8)
jammy
Released (5.7-0ubuntu0.22.04.2)
upstream
Released (6.4)
lunar
Released (5.7-1ubuntu3.1)
mantic
Released (6.1-2ubuntu1.1)
Patches:
upstream: https://github.com/squid-cache/squid/commit/6cfa10d94ca15a764a1d975597d8024582ef19be (6.x)
upstream: https://github.com/squid-cache/squid/commit/05f6af2f4c85cc99323cfff6149c3d74af661b6d (5.x)
squid3
Launchpad, Ubuntu, Debian
trusty Ignored
(end of standard support)
xenial Needs triage

bionic Needs triage

focal Does not exist

jammy Does not exist

lunar Does not exist

mantic Does not exist

upstream Needs triage

Severity score breakdown

Parameter Value
Base score 5.3
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N