First published: Tue Oct 24 2023(Updated: )
SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=2.6<6.4 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Eus | =8.8 | |
Redhat Enterprise Linux Eus | =9.0 | |
Redhat Enterprise Linux Eus | =9.2 | |
Redhat Enterprise Linux For Arm 64 | =8.0_aarch64 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0_s390x | |
Redhat Enterprise Linux For Power Little Endian | =8.0_ppc64le | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.6 | |
Redhat Enterprise Linux Server Aus | =9.2 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.6 | |
Redhat Enterprise Linux Server Tus | =8.8 | |
Redhat Enterprise Linux Server Tus | =9.2 | |
redhat/squid | <6.4 | 6.4 |
ubuntu/squid | <4.10-1ubuntu1.8 | 4.10-1ubuntu1.8 |
ubuntu/squid | <5.7-0ubuntu0.22.04.2 | 5.7-0ubuntu0.22.04.2 |
ubuntu/squid | <5.7-1ubuntu3.1 | 5.7-1ubuntu3.1 |
ubuntu/squid | <6.1-2ubuntu1.1 | 6.1-2ubuntu1.1 |
ubuntu/squid | <6.1-2ubuntu2 | 6.1-2ubuntu2 |
ubuntu/squid | <6.4 | 6.4 |
debian/squid | <=4.6-1+deb10u7<=4.13-10+deb11u2<=5.7-2 | 4.6-1+deb10u10 4.13-10+deb11u3 5.7-2+deb12u1 6.9-1 |
>=2.6<6.4 | ||
=8.0 | ||
=9.0 | ||
=8.6 | ||
=8.8 | ||
=9.0 | ||
=9.2 | ||
=8.0_aarch64 | ||
=8.0_s390x | ||
=8.0_ppc64le | ||
=8.2 | ||
=8.4 | ||
=8.6 | ||
=9.2 | ||
=8.2 | ||
=8.4 | ||
=8.6 | ||
=8.8 | ||
=9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46846 is a vulnerability in Squid that allows a remote attacker to perform HTTP request smuggling past firewall and frontend security systems.
CVE-2023-46846 has a severity rating of 9.3 (Critical).
To fix CVE-2023-46846, update your Squid software to version 6.4 or later.
Squid versions up to 6.4 are affected by CVE-2023-46846.
You can find more information about CVE-2023-46846 on the Redhat advisory page: [link](https://access.redhat.com/errata/RHSA-2023:6266).