Improper Input Validation Affecting squid:4/libecap package, versions <0:1.0.1-2.module_el8.6.0+2741+01592ae8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX8-SQUID-5617012
- published 28 May 2023
- disclosed 3 Nov 2020
Introduced: 3 Nov 2020
CVE-2019-12520 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:8
squid:4/libecap
to version 0:1.0.1-2.module_el8.6.0+2741+01592ae8 or higher.
This issue was patched in ALSA-2020:4743
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream squid:4/libecap
package and not the squid:4/libecap
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:8
relevant fixed versions and status.
An issue was discovered in Squid through 4.7 and 5. When receiving a request, Squid checks its cache to see if it can serve up a response. It does this by making a MD5 hash of the absolute URL of the request. If found, it servers the request. The absolute URL can include the decoded UserInfo (username and password) for certain protocols. This decoded info is prepended to the domain. This allows an attacker to provide a username that has special characters to delimit the domain, and treat the rest of the URL as a path or query string. An attacker could first make a request to their domain using an encoded username, then when a request for the target domain comes in that decodes to the exact URL, it will serve the attacker's HTML instead of the real HTML. On Squid servers that also act as reverse proxies, this allows an attacker to gain access to features that only reverse proxies can use, such as ESI.
References
- https://errata.almalinux.org/8/ALSA-2020-4743.html
- https://vulners.com/cve/CVE-2019-12520
- http://www.squid-cache.org/Versions/v4/
- http://www.squid-cache.org/Versions/v4/changesets/
- https://github.com/squid-cache/squid/commits/v4
- https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12520.txt
- https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html
- https://security.netapp.com/advisory/ntap-20210205-0006/
- https://usn.ubuntu.com/4446-1/
- https://www.debian.org/security/2020/dsa-4682