Description
Squid 3.1.9 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T22:19:37.657Z
Reserved: 2012-04-06T00:00:00.000Z
Link: CVE-2012-2213
No data.
Status : Modified
Published: 2012-04-28T10:06:13.273
Modified: 2026-04-29T01:13:23.040
Link: CVE-2012-2213
OpenCVE Enrichment
No data.
Weaknesses