vulnerability
CentOS Linux: CVE-2019-12523: Moderate: squid:4 security, bug fix, and enhancement update (CESA-2020:4743)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | Nov 26, 2019 | Nov 5, 2020 | May 25, 2023 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Nov 26, 2019
Added
Nov 5, 2020
Modified
May 25, 2023
Description
An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.
Solution(s)
centos-upgrade-libecapcentos-upgrade-libecap-debuginfocentos-upgrade-libecap-debugsourcecentos-upgrade-libecap-develcentos-upgrade-squidcentos-upgrade-squid-debuginfocentos-upgrade-squid-debugsource
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.