First published: Fri Feb 20 2015(Updated: )
CRLF injection vulnerability in Squid before 3.1.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted header in a response.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | <=3.1.0.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0881 is classified as a high severity vulnerability due to its potential for HTTP response splitting attacks.
The recommended fix for CVE-2015-0881 is to upgrade Squid to version 3.1.1 or higher.
CVE-2015-0881 affects Squid versions prior to 3.1.1, specifically all versions up to and including 3.1.0.18.
CVE-2015-0881 allows remote attackers to conduct HTTP response splitting attacks by injecting arbitrary HTTP headers.
Yes, CVE-2015-0881 can be exploited easily by sending specially crafted headers in an HTTP response.