Description
An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
References (10)
Scores
CVSS v3
9.9
EPSS
0.1565
EPSS Percentile
94.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-444
Status
published
Products (3)
fedoraproject/fedora
31
squid-cache/squid
2.7 (9 CPE variants)
squid-cache/squid
2.0 - 2.6
Published
Jun 30, 2020
Tracked Since
Feb 18, 2026