First published: Wed Apr 15 2020(Updated: )
An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | <=4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in Squid is CVE-2019-12522.
CVE-2019-12522 has a severity rating of medium (4.5).
When Squid is run as root, it spawns its child processes as a lesser user, leaving the Saved UID as 0, which can be exploited by an attacker who has compromised the child process.
Squid versions up to and including 4.7 are affected by CVE-2019-12522.
Yes, you can find references for CVE-2019-12522 at the following links: - [https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12522.txt](https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12522.txt) - [https://security.netapp.com/advisory/ntap-20210205-0006/](https://security.netapp.com/advisory/ntap-20210205-0006/)