An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2278-1 | squid3 security update |
Debian DLA |
DLA-2278-2 | squid3 regression update |
Debian DSA |
DSA-4682-1 | squid security update |
EUVD |
EUVD-2019-4118 | An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost. |
Ubuntu USN |
USN-4213-1 | Squid vulnerabilities |
Ubuntu USN |
USN-4446-1 | Squid vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:24:39.198Z
Reserved: 2019-06-02T00:00:00
Link: CVE-2019-12523
No data.
Status : Modified
Published: 2019-11-26T17:15:10.767
Modified: 2024-11-21T04:23:01.897
Link: CVE-2019-12523
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN