First published: Fri Jul 05 2019(Updated: )
A vulnerability was found in cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter. Reference: <a href="https://bugs.squid-cache.org/show_bug.cgi?id=4957">https://bugs.squid-cache.org/show_bug.cgi?id=4957</a> <a href="https://github.com/squid-cache/squid/pull/429">https://github.com/squid-cache/squid/pull/429</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/squid | <=4.6-1<=4.6-2 | 4.8-1 4.6-1+deb10u1 |
Squid-Cache Squid | <=4.7 | |
Debian Debian Linux | =8.0 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13345 is a vulnerability in the cachemgr.cgi web module of Squid through version 4.7 that allows for XSS attacks via the user_name or auth parameter.
The severity of CVE-2019-13345 is high, with a CVSS score of 6.1.
To fix CVE-2019-13345, you should update Squid to version 4.8-1 or apply the appropriate security patches provided by the vendor.
You can find more information about CVE-2019-13345 on the MITRE CVE database (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13345), the Debian LTS announcement (https://lists.debian.org/debian-lts-announce/2019/07/msg00006.html), and the Ubuntu security notice (https://ubuntu.com/security/notices/USN-4059-1).
CVE-2019-13345 is classified under CWE-79, which is the category for Cross-Site Scripting (XSS) vulnerabilities.