Rapid7 Vulnerability & Exploit Database

Oracle Linux: CVE-2020-15049: ELSA-2020-4743: squid:4 security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: CVE-2020-15049: ELSA-2020-4743: squid:4 security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:H/Au:S/C:C/I:C/A:C)
Published
06/26/2020
Created
10/14/2020
Added
10/09/2020
Modified
07/22/2024

Description

An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value. A flaw was found in squid. A trusted client is able to perform a request smuggling and poison the HTTP cache contents with crafted HTTP(S) request messages. This attack requires an upstream server to participate in the smuggling and generate the poison response sequence. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Solution(s)

  • oracle-linux-upgrade-libecap
  • oracle-linux-upgrade-libecap-devel
  • oracle-linux-upgrade-squid
  • oracle-linux-upgrade-squid-migration-script
  • oracle-linux-upgrade-squid-sysvinit

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;