Privilege Escalation Affecting squid package, versions [,4.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Privilege Escalation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-SQUID-2370887
  • published26 Jan 2022
  • disclosed15 Apr 2020
  • creditUnknown

Introduced: 15 Apr 2020

CVE-2019-12522  (opens in a new tab)
CWE-269  (opens in a new tab)

How to fix?

Upgrade squid to version 4.8 or higher.

Overview

Affected versions of this package are vulnerable to Privilege Escalation. An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.

References

CVSS Scores

version 3.1