Squid is prone to multiple denial of service (DoS) vulnerabilities due to improper handling of structural elements and incomplete filtering of special elements, impacting versions prior to 6.
Reporter | Title | Published | Views | Family All 85 |
---|---|---|---|---|
![]() | AlmaLinux 9 : squid (ALSA-2023:7465) | 23 Nov 202300:00 | – | nessus |
![]() | Ubuntu 20.04 LTS : Squid regression (USN-6728-2) | 11 Apr 202400:00 | – | nessus |
![]() | Oracle Linux 8 : squid:4 (ELSA-2023-7668) | 11 Dec 202300:00 | – | nessus |
![]() | Linux Distros Unpatched Vulnerability : CVE-2023-5824 | 5 Mar 202500:00 | – | nessus |
![]() | RHEL 9 : squid (RHSA-2023:7465) | 22 Nov 202300:00 | – | nessus |
![]() | RHEL 8 : squid:4 (RHSA-2023:7668) | 6 Dec 202300:00 | – | nessus |
![]() | Oracle Linux 9 : squid (ELSA-2023-7465) | 28 Nov 202300:00 | – | nessus |
![]() | Rocky Linux 8 : squid:4 (RLSA-2023:7668) | 6 Dec 202300:00 | – | nessus |
![]() | Ubuntu 20.04 LTS : Squid vulnerability (USN-6728-3) | 24 Apr 202400:00 | – | nessus |
![]() | Photon OS 4.0: Squid PHSA-2023-4.0-0520 | 24 Jul 202400:00 | – | nessus |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:squid-cache:squid";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.100705");
script_version("2024-11-01T05:05:36+0000");
script_tag(name:"last_modification", value:"2024-11-01 05:05:36 +0000 (Fri, 01 Nov 2024)");
# nb: This was initially a single VT which got split into multiple later. As we covered all flaws
# at this time the original creation_date has been kept in all later created VTs.
script_tag(name:"creation_date", value:"2023-10-20 08:47:30 +0000 (Fri, 20 Oct 2023)");
script_tag(name:"cvss_base", value:"7.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2023-11-13 18:25:00 +0000 (Mon, 13 Nov 2023)");
script_cve_id("CVE-2023-5824");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Squid Multiple DoS Vulnerabilities (GHSA-543m-w2m2-g255, SQUID-2023:2)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Web Servers");
script_dependencies("gb_squid_http_detect.nasl");
script_mandatory_keys("squid/detected");
script_tag(name:"summary", value:"Squid is prone to multiple denial of service (DoS)
vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The following flaws exist:
- Due to an Improper Handling of Structural Elements bug Squid is vulnerable to a Denial of
Service attack against HTTP and HTTPS clients.
- Due to an Incomplete Filtering of Special Elements bug Squid is vulnerable to a Denial of
Service attack against HTTP and HTTPS clients.
These flaws were part of the 'Squid Caching Proxy Security Audit: 55 vulnerabilities and 35 0days'
publication in October 2023 and filed as 'Cache Poisoning by Large Stored Response Headers (With
Bonus XSS)'.");
script_tag(name:"affected", value:"Squid versions prior to 6.4.");
script_tag(name:"solution", value:"Update to version 6.4 or later.");
script_xref(name:"URL", value:"https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255");
script_xref(name:"URL", value:"https://megamansec.github.io/Squid-Security-Audit/");
script_xref(name:"URL", value:"https://joshua.hu/squid-security-audit-35-0days-45-exploits");
script_xref(name:"URL", value:"https://www.openwall.com/lists/oss-security/2023/10/11/3");
script_xref(name:"URL", value:"https://gist.github.com/rousskov/9af0d33d2a1f4b5b3b948b2da426e77d");
script_xref(name:"URL", value:"https://megamansec.github.io/Squid-Security-Audit/cache-headers.html");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (!port = get_app_port(cpe: CPE))
exit(0);
if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
exit(0);
version = infos["version"];
location = infos["location"];
if (version_is_less(version: version, test_version: "6.4")) {
report = report_fixed_ver(installed_version: version, fixed_version: "6.4", install_path: location);
security_message(port: port, data: report);
exit(0);
}
exit(99);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo