Vulnerability CVE-2020-15811: Information

Description

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

Severity: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Published: Sept. 2, 2020
Modified: Feb. 2, 2024
Error type identifier: CWE-697

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
squidsisyphus4.13-alt16.8-alt1ALT-PU-2020-3116-1260268Fixed
squidp104.13-alt16.6-alt1ALT-PU-2020-3116-1260268Fixed
squidp94.13-alt14.13-alt1ALT-PU-2020-3140-1260355Fixed
squidc10f14.13-alt16.6-alt1ALT-PU-2020-3116-1260268Fixed
squidc9f24.13-alt14.15-alt1ALT-PU-2020-3142-1260359Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
DSA-4751
  • Mailing List
  • Third Party Advisory
https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv
  • Patch
USN-4477-1
  • Third Party Advisory
openSUSE-SU-2020:1346
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2020:1369
  • Mailing List
  • Third Party Advisory
USN-4551-1
  • Third Party Advisory
[debian-lts-announce] 20201002 [SECURITY] [DLA 2394-1] squid3 security update
  • Mailing List
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20210219-0007/
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0007/
  • Broken Link
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0006/
  • Third Party Advisory
FEDORA-2020-73af8655eb
  • Mailing List
  • Third Party Advisory
FEDORA-2020-63f3bd656e
  • Mailing List
  • Third Party Advisory
FEDORA-2020-6c58bff862
  • Mailing List
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
      Start including
      5.0
      End excliding
      5.0.4

      cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
      End excliding
      4.13

      Configuration 2

      cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

      Configuration 3

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

      Configuration 4

      cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

      cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

      cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

      Configuration 5

      cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

      cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*