First published: Mon Mar 29 2021(Updated: )
Alex Rousskov and Amit Klein discovered that Squid incorrectly handled certain Content-Length headers. A remote attacker could possibly use this issue to perform an HTTP request smuggling attack, resulting in cache poisoning. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-15049) Jianjun Chen discovered that Squid incorrectly validated certain input. A remote attacker could use this issue to perform HTTP Request Smuggling and possibly access services forbidden by the security controls. (CVE-2020-25097)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/squid | <4.13-1ubuntu2.1 | 4.13-1ubuntu2.1 |
=20.10 | ||
All of | ||
ubuntu/squid | <4.10-1ubuntu1.3 | 4.10-1ubuntu1.3 |
=20.04 | ||
All of | ||
ubuntu/squid | <3.5.27-1ubuntu1.10 | 3.5.27-1ubuntu1.10 |
=18.04 | ||
All of | ||
ubuntu/squid | <3.5.12-1ubuntu7.16 | 3.5.12-1ubuntu7.16 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Squid vulnerability is CVE-2020-15049.
CVE-2020-15049 could allow a remote attacker to perform an HTTP request smuggling attack, resulting in cache poisoning.
This vulnerability affects Ubuntu 20.04 LTS, 20.10, 18.04, and 16.04.
To fix the Squid vulnerability CVE-2020-15049, you should update to Squid version 4.13-1ubuntu2.1 for Ubuntu 20.04 LTS.
You can find more information about this vulnerability in the Ubuntu security notice USN-4895-1.