Bugzilla – Bug 1170423
VUL-0: CVE-2019-12520, CVE-2019-12524: squid: Proxy Cache Security Update (SQUID-2019:4)
Last modified: 2020-10-21 09:27:07 UTC
__________________________________________________________________ Squid Proxy Cache Security Update Advisory SQUID-2019:4 __________________________________________________________________ Advisory ID: SQUID-2019:4 Date: April 18, 2020 Summary: Multiple Issues in HTTP Request processing. Affected versions: Squid 3.5.18 -> 3.5.28 Squid 4.0.10 -> 4.7 Fixed in version: Squid 4.8 __________________________________________________________________ http://www.squid-cache.org/Advisories/SQUID-2019_4.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12520 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12524 __________________________________________________________________ Problem Description: Due to incorrect URL handling Squid is vulnerable to access control bypass, cache poisoning and cross-site scripting attacks when processing HTTP Request messages. __________________________________________________________________ Severity: A remote client can deliver crafted URLs to bypass cache manager security controls and retrieve confidential details about the proxy and traffic it is handling. A remote client can deliver crafted URLs which cause arbitrary content from one origin server to be stored in cache as URLs within another origin. This opens a window of opportunity for clients to be tricked into fetching and XSS execution of that content via side channels. __________________________________________________________________ Updated Packages: This bug is fixed by Squid version 4.8. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 4: <http://www.squid-cache.org/Versions/v4/changesets/SQUID-2019_4.patch> If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. __________________________________________________________________ Determining if your version is vulnerable: All Squid-2.x are not vulnerable. All Squid-3.x up to and including 3.5.17 are not vulnerable. All Squid-3.5.18 up to and including 3.5.28 are vulnerable. All Squid-4.x up to and including 4.0.9 are not vulnerable. All Squid-4.x up to and including 4.7 without HTTPS support are not vulnerable. All Squid-4.0.10 up to and including 4.7 with HTTPS support are vulnerable. __________________________________________________________________ Workarounds: There are no workarounds for Squid-3.5. For Squid-4 build using --without-openssl --without-gnutls __________________________________________________________________ Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If your install and build Squid from the original Squid sources then the squid-users@lists.squid-cache.org mailing list is your primary support point. For subscription details see <http://www.squid-cache.org/Support/mailing-lists.html>. For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used <http://bugs.squid-cache.org/>. For reporting of security sensitive bugs send an email to the squid-bugs@lists.squid-cache.org mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. __________________________________________________________________ Credits: This vulnerability was discovered by Jeriko One <jeriko.one@gmx.us>. Fixed by Amos Jeffries of Treehouse Networks Ltd. __________________________________________________________________ Revision history: 2019-05-14 14:56:49 UTC Initial Report 2019-06-23 15:15:56 UTC Patches Released 2019-06-05 15:52:17 UTC CVE Assignment __________________________________________________________________ END
*** Bug 1169666 has been marked as a duplicate of this bug. ***
ONLY SLE12-SP2 is affected. All the other codestreams are not affected
Created attachment 836733 [details] squid_sploit.py QA REPRODUCER: squid_sploit.py from researcher. Did not test it out.
https://gitlab.com/jeriko.one/security/-/tree/master/squid/exploits
SUSE-SU-2020:1227-1: An update that fixes 5 vulnerabilities is now available. Category: security (important) Bug References: 1169659,1170313,1170423 CVE References: CVE-2019-12519,CVE-2019-12520,CVE-2019-12521,CVE-2019-12524,CVE-2020-11945 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): squid-3.5.21-26.23.1 SUSE OpenStack Cloud 8 (src): squid-3.5.21-26.23.1 SUSE OpenStack Cloud 7 (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP4 (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): squid-3.5.21-26.23.1 SUSE Enterprise Storage 5 (src): squid-3.5.21-26.23.1 HPE Helion Openstack 8 (src): squid-3.5.21-26.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
released
SUSE-SU-2020:14460-1: An update that fixes 21 vulnerabilities is now available. Category: security (important) Bug References: 1140738,1141329,1141332,1156323,1156324,1156326,1156328,1156329,1162687,1162689,1162691,1167373,1169659,1170313,1170423,1173304,1173455 CVE References: CVE-2019-12519,CVE-2019-12520,CVE-2019-12521,CVE-2019-12523,CVE-2019-12524,CVE-2019-12525,CVE-2019-12526,CVE-2019-12528,CVE-2019-12529,CVE-2019-13345,CVE-2019-18676,CVE-2019-18677,CVE-2019-18678,CVE-2019-18679,CVE-2019-18860,CVE-2020-11945,CVE-2020-14059,CVE-2020-15049,CVE-2020-8449,CVE-2020-8450,CVE-2020-8517 JIRA References: Sources used: SUSE Linux Enterprise Server 11-SP4-LTSS (src): squid3-3.1.23-8.16.37.12.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): squid3-3.1.23-8.16.37.12.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): squid3-3.1.23-8.16.37.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.