CVE-2020-15811

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html Mailing List Third Party Advisory
https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv Patch
https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/ Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20210219-0007/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0006/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0007/ Broken Link Third Party Advisory
https://usn.ubuntu.com/4477-1/ Third Party Advisory
https://usn.ubuntu.com/4551-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4751 Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html Mailing List Third Party Advisory
https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv Patch
https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/ Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20210219-0007/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0006/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0007/ Broken Link Third Party Advisory
https://usn.ubuntu.com/4477-1/ Third Party Advisory
https://usn.ubuntu.com/4551-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4751 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-09-02 17:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-15811

Mitre link : CVE-2020-15811

CVE.ORG link : CVE-2020-15811


JSON object : View

Products Affected

opensuse

  • leap

canonical

  • ubuntu_linux

squid-cache

  • squid

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-697

Incorrect Comparison