4.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
6.1 Medium
AI Score
Confidence
High
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.004 Low
EPSS
Percentile
72.5%
Squid is prone to a denial of service (DoS) vulnerability in
the Cache Manager.
# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:squid-cache:squid";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.146028");
script_version("2024-03-07T05:06:18+0000");
script_tag(name:"last_modification", value:"2024-03-07 05:06:18 +0000 (Thu, 07 Mar 2024)");
script_tag(name:"creation_date", value:"2021-05-28 03:42:00 +0000 (Fri, 28 May 2021)");
script_tag(name:"cvss_base", value:"4.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:N/I:N/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2021-06-14 09:15:00 +0000 (Mon, 14 Jun 2021)");
script_cve_id("CVE-2021-28652");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Squid 1.0 < 4.14, 5.0 < 5.0.5 DoS Vulnerability (GHSA-m47m-9hvw-7447, SQUID-2021:3)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2021 Greenbone AG");
script_family("Denial of Service");
script_dependencies("gb_squid_http_detect.nasl");
script_mandatory_keys("squid/detected");
script_tag(name:"summary", value:"Squid is prone to a denial of service (DoS) vulnerability in
the Cache Manager.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Due to an incorrect parser validation bug Squid is vulnerable to
a DoS attack against the Cache Manager API.
This problem allows a trusted client to trigger memory leaks which over time lead to a DoS against
Squid and the machine it is operating on.
This attack is limited to clients with Cache Manager API access privilege.
This flaw was part of the 'Squid Caching Proxy Security Audit: 55 vulnerabilities and 35 0days'
publication in October 2023 and filed as 'Memory Leak in CacheManager URI Parsing'.");
script_tag(name:"affected", value:"Squid version 1.0 through 4.14 and 5.0 through 5.0.5.");
script_tag(name:"solution", value:"Update to version 4.15, 5.0.6 or later. See the referenced vendor
advisory for a workaround.");
script_xref(name:"URL", value:"https://github.com/squid-cache/squid/security/advisories/GHSA-m47m-9hvw-7447");
script_xref(name:"URL", value:"https://megamansec.github.io/Squid-Security-Audit/");
script_xref(name:"URL", value:"https://joshua.hu/squid-security-audit-35-0days-45-exploits");
script_xref(name:"URL", value:"https://www.openwall.com/lists/oss-security/2023/10/11/3");
script_xref(name:"URL", value:"https://megamansec.github.io/Squid-Security-Audit/cachemanager-memleak.html");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (!port = get_app_port(cpe: CPE))
exit(0);
if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
exit(0);
version = infos["version"];
location = infos["location"];
if (version_in_range(version: version, test_version: "1.0", test_version2: "4.14")) {
report = report_fixed_ver(installed_version: version, fixed_version: "4.15", install_path: location);
security_message(port: port, data: report);
exit(0);
}
if (version_in_range(version: version, test_version: "5.0", test_version2: "5.0.5")) {
report = report_fixed_ver(installed_version: version, fixed_version: "5.0.6", install_path: location);
security_message(port: port, data: report);
exit(0);
}
exit(99);
4.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
6.1 Medium
AI Score
Confidence
High
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.004 Low
EPSS
Percentile
72.5%