漏洞标题
N/A
漏洞描述信息
**争议** squid 3.1.9 允许远程攻击者通过在 Host HTTP 头中提供任意允许的主机名绕过连接方法的访问配置。请注意:此问题可能无法重复,因为研究者无法为脆弱性系统提供 squid.conf 文件,并且观察到的行为与设计为根据 "req_header Host" acl regex 匹配 www.uol.com.br.的 squid.conf 文件一致。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
Squid 3.1.9 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Squid权限许可和访问控制漏洞
漏洞描述信息
Squid(全称Squid Cache)是一套代理服务器和Web缓存服务器软件。该软件提供缓存万维网、过滤流量、代理上网等功能。 Squid 3.1.9版本中存在漏洞。远程攻击者可通过提供一个任意允许的在Host HTTP头中的主机名,绕过CONNECT方法的访问配置。
CVSS信息
N/A
漏洞类别
授权问题