CVE-2020-15049
30.06.2020, 18:15
An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
Vendor | Product | Version |
---|---|---|
squid-cache | squid | 2.0 ≤ 𝑥 ≤ 2.6 |
squid-cache | squid | 3.1 ≤ 𝑥 ≤ 3.5.28 |
squid-cache | squid | 4.0 ≤ 𝑥 < 4.12 |
squid-cache | squid | 5.0 ≤ 𝑥 < 5.0.3 |
squid-cache | squid | 2.7 |
squid-cache | squid | 2.7:stable2 |
squid-cache | squid | 2.7:stable3 |
squid-cache | squid | 2.7:stable4 |
squid-cache | squid | 2.7:stable5 |
squid-cache | squid | 2.7:stable6 |
squid-cache | squid | 2.7:stable7 |
squid-cache | squid | 2.7:stable8 |
squid-cache | squid | 2.7:stable9 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References