CVE Vulnerabilities

CVE-2019-12523

Published: Nov 26, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
7.4 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesnt go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.

Affected Software

NameVendorStart VersionEnd Version
SquidSquid-cache3.0 (including)3.5.28 (including)
SquidSquid-cache4.0 (including)4.8 (including)
Red Hat Enterprise Linux 8RedHatsquid:4-8030020200828070549.30b713e6*
SquidUbuntudevel*
SquidUbuntudisco*
SquidUbuntueoan*
SquidUbuntuesm-infra/focal*
SquidUbuntufocal*
SquidUbuntugroovy*
SquidUbuntuhirsute*
SquidUbuntutrusty*
SquidUbuntuupstream*
Squid3Ubuntubionic*
Squid3Ubuntuesm-infra/bionic*
Squid3Ubuntuesm-infra/xenial*
Squid3Ubuntuprecise/esm*
Squid3Ubuntutrusty*
Squid3Ubuntuxenial*

References