ID |
CVE-2004-0189
|
Summary |
The "%xx" URL decoding function in Squid 2.5STABLE4 and earlier allows remote attackers to bypass url_regex ACLs via a URL with a NULL ("%00") character, which causes Squid to use only a portion of the requested URL when comparing it against the access control lists. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:squid:squid:2.0_patch2:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.0_patch2:*:*:*:*:*:*:*
-
cpe:2.3:a:squid:squid:2.1_patch2:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.1_patch2:*:*:*:*:*:*:*
-
cpe:2.3:a:squid:squid:2.3_stable5:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.3_stable5:*:*:*:*:*:*:*
-
cpe:2.3:a:squid:squid:2.4:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.4:*:*:*:*:*:*:*
-
cpe:2.3:a:squid:squid:2.4_stable7:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.4_stable7:*:*:*:*:*:*:*
-
cpe:2.3:a:squid:squid:2.5_stable3:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.5_stable3:*:*:*:*:*:*:*
-
cpe:2.3:a:squid:squid:2.5_stable4:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.5_stable4:*:*:*:*:*:*:*
|
CVSS |
Base: | 7.5 (as of 10-10-2017 - 01:30) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
oval
via4
|
accepted | 2010-09-20T04:00:45.311-04:00 | class | vulnerability | contributors | name | Jay Beale | organization | Bastille Linux |
name | Thomas R. Jones | organization | Maitreya Security |
name | Jonathan Baker | organization | The MITRE Corporation |
| description | The "%xx" URL decoding function in Squid 2.5STABLE4 and earlier allows remote attackers to bypass url_regex ACLs via a URL with a NULL ("%00") characterm, which causes Squid to use only a portion of the requested URL when comparing it against the access control lists. | family | unix | id | oval:org.mitre.oval:def:877 | status | accepted | submitted | 2004-04-07T12:00:00.000-04:00 | title | Red Hat Squid ACL Bypass Vulnerability | version | 41 |
accepted | 2010-09-20T04:00:46.445-04:00 | class | vulnerability | contributors | name | Jay Beale | organization | Bastille Linux |
name | Thomas R. Jones | organization | Maitreya Security |
name | Jonathan Baker | organization | The MITRE Corporation |
| description | The "%xx" URL decoding function in Squid 2.5STABLE4 and earlier allows remote attackers to bypass url_regex ACLs via a URL with a NULL ("%00") characterm, which causes Squid to use only a portion of the requested URL when comparing it against the access control lists. | family | unix | id | oval:org.mitre.oval:def:941 | status | accepted | submitted | 2004-05-10T12:00:00.000-04:00 | title | Red Hat Enterprise 3 Squid ACL Bypass Vulnerability | version | 41 |
|
redhat
via4
|
advisories | | rpms | - squid-7:2.5.STABLE3-5.3E
- squid-debuginfo-7:2.5.STABLE3-5.3E
|
|
refmap
via4
|
bid | 9778 | bugtraq | 20040401 [OpenPKG-SA-2004.008] OpenPKG Security Advisory (squid) | conectiva | CLA-2004:838 | confirm | http://www.squid-cache.org/Advisories/SQUID-2004_1.txt | debian | DSA-474 | gentoo | GLSA-200403-11 | mandrake | MDKSA-2004:025 | osvdb | 5916 | sco | SCOSA-2005.16 | sgi | 20040404-01-U | xf | squid-urlregex-acl-bypass(15366) |
|
Last major update |
10-10-2017 - 01:30 |
Published |
15-03-2004 - 05:00 |
Last modified |
10-10-2017 - 01:30 |