First published: Fri Dec 31 1999(Updated: )
Squid 2.2.STABLE5 and below, when using external authentication, allows attackers to bypass access controls via a newline in the user/password pair.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =1.0 | |
Squid Web Proxy Cache | =1.1 | |
Squid Web Proxy Cache | =2.1 | |
Squid Web Proxy Cache | =2.2 | |
Squid Web Proxy Cache | =1.0novm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1481 is considered a critical vulnerability as it allows attackers to bypass access control measures.
To fix CVE-1999-1481, upgrade to a version of Squid that is above 2.2.STABLE5.
CVE-1999-1481 affects Squid versions 2.2.STABLE5 and earlier, as well as versions 1.0, 1.1, and 2.1.
Yes, CVE-1999-1481 can be exploited remotely by attackers leveraging external authentication with specially crafted user/password inputs.
CVE-1999-1481 can be exploited to gain unauthorized access to resources restricted by access controls.