CVE-2020-25097

An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 74%
VendorProductVersion
squid-cachesquid
2.0 ≤
𝑥
< 4.14
squid-cachesquid
5.0.1 ≤
𝑥
< 5.0.5
debiandebian_linux
10.0
netappcloud_manager
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
squid
bullseye (security)
4.13-10+deb11u3
fixed
bullseye
4.13-10+deb11u3
fixed
bookworm
5.7-2+deb12u2
fixed
bookworm (security)
5.7-2+deb12u2
fixed
sid
6.12-1
fixed
trixie
6.12-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
squid
hirsute
Fixed 4.13-1ubuntu3
released
groovy
Fixed 4.13-1ubuntu2.1
released
focal
Fixed 4.10-1ubuntu1.3
released
bionic
dne
xenial
dne
trusty
dne
squid3
hirsute
dne
groovy
dne
focal
dne
bionic
Fixed 3.5.27-1ubuntu1.10
released
xenial
Fixed 3.5.12-1ubuntu7.16
released
trusty
dne
References