Vulnerability CVE-2020-15049: Information

Description

An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.

Severity: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Published: June 30, 2020
Modified: Nov. 7, 2023
Error type identifier: CWE-444

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
squidsisyphus4.13-alt16.8-alt1ALT-PU-2020-3116-1260268Fixed
squidp104.13-alt16.6-alt1ALT-PU-2020-3116-1260268Fixed
squidp94.13-alt14.13-alt1ALT-PU-2020-3140-1260355Fixed
squidc10f14.13-alt16.6-alt1ALT-PU-2020-3116-1260268Fixed
squidc9f24.13-alt14.15-alt1ALT-PU-2020-3142-1260359Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*

      cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*

      cpe:2.3:a:squid-cache:squid:2.7:*:*:*:*:*:*:*

      cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:*

      cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:*

      cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:*

      cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:*

      cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:*

      cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:*

      cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
      Start including
      4.0
      End excliding
      4.12

      cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
      Start including
      3.1
      End including
      3.5.28

      cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
      Start including
      2.0
      End including
      2.6

      cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
      Start including
      5.0
      End excliding
      5.0.3

      Configuration 2

      cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*