CVE-2019-18678

Current Description

An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.

Basic Data

PublishedNovember 26, 2019
Last ModifiedJuly 11, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-444
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationSquid-cacheSquid********3.03.5.28
    2.3ApplicationSquid-cacheSquid********4.04.8
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux16.04***lts***
    2.3OSCanonicalUbuntu Linux18.04***lts***
    2.3OSCanonicalUbuntu Linux19.04*******
    2.3OSCanonicalUbuntu Linux19.10*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux8.0*******
    2.3OSFedoraprojectFedora30*******
    2.3OSFedoraprojectFedora31*******

Vulnerable Software List

VendorProductVersions
Debian Debian Linux 8.0
Canonical Ubuntu Linux 16.04, 18.04, 19.04, 19.10
Squid-cache Squid *
Fedoraproject Fedora 30, 31

References

NameSourceURLTags
http://www.squid-cache.org/Advisories/SQUID-2019_10.txthttp://www.squid-cache.org/Advisories/SQUID-2019_10.txtCONFIRMThird Party Advisory
http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patchhttp://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.pCONFIRMRelease Notes
https://bugzilla.suse.com/show_bug.cgi?id=1156323https://bugzilla.suse.com/show_bug.cgi?id=1156323CONFIRMIssue Tracking Third Party Advisory
https://github.com/squid-cache/squid/pull/445https://github.com/squid-cache/squid/pull/445MISCPatch Third Party Advisory
[debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security updatehttps://lists.debian.org/debian-lts-announce/2019/12/msg00011.htmlMLISTThird Party Advisory
[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security updatehttps://lists.debian.org/debian-lts-announce/2020/07/msg00009.htmlMLIST
FEDORA-2019-9538783033https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTM74FEDORAMailing List Third Party Advisory
FEDORA-2019-0b16cbdd0ehttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEMOYFEDORAMailing List Third Party Advisory
GLSA-202003-34https://security.gentoo.org/glsa/202003-34GENTOO
USN-4213-1https://usn.ubuntu.com/4213-1/UBUNTUThird Party Advisory
DSA-4682https://www.debian.org/security/2020/dsa-4682DEBIAN