First published: Mon Jul 08 2019(Updated: )
A vulnerability was found in cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter. Reference: <a href="https://bugs.squid-cache.org/show_bug.cgi?id=4957">https://bugs.squid-cache.org/show_bug.cgi?id=4957</a> <a href="https://github.com/squid-cache/squid/pull/429">https://github.com/squid-cache/squid/pull/429</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | <=4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1727744 is classified as a moderate security risk due to its XSS vulnerability.
To fix REDHAT-BUG-1727744, upgrade to a version of Squid later than 4.7 that addresses this vulnerability.
REDHAT-BUG-1727744 affects Squid versions up to and including 4.7.
REDHAT-BUG-1727744 is an XSS (Cross-Site Scripting) vulnerability found in the cachemgr.cgi web module.
The vulnerability in REDHAT-BUG-1727744 involves the user_name and auth parameters.