CVE Vulnerabilities

CVE-2019-12522

Improper Privilege Management

Published: Apr 15, 2020 | Modified: Nov 21, 2024
CVSS 3.x
4.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS 2.x
4.4 MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
4.5 LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
SquidSquid-cache*4.7 (including)
SquidUbuntueoan*
SquidUbuntufocal*
SquidUbuntugroovy*
SquidUbuntuhirsute*
SquidUbuntuimpish*
SquidUbuntukinetic*
SquidUbuntulunar*
SquidUbuntumantic*
SquidUbuntuoracular*
SquidUbuntuplucky*
SquidUbuntutrusty*
SquidUbuntuupstream*
Squid3Ubuntubionic*
Squid3Ubuntuprecise/esm*
Squid3Ubuntutrusty*
Squid3Ubuntuupstream*
Squid3Ubuntuxenial*

Potential Mitigations

References