security/vuxml: Document exposure of sensitive information in cache manager of squid

This commit is contained in:
Yasuhiro Kimura 2022-09-26 19:02:34 +09:00
parent 3f586f68b2
commit f68c3880c6

View file

@ -1,3 +1,38 @@
<vuln vid="f9ada0b5-3d80-11ed-9330-080027f5fec9">
<topic>squid -- Exposure of sensitive information in cache manager</topic>
<affects>
<package>
<name>squid</name>
<range><lt>5.7</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Mikhail Evdokimov (aka konata) reports:</p>
<blockquote cite="https://github.com/squid-cache/squid/security/advisories/GHSA-rcg9-7fqm-83mq">
<p>
Due to inconsistent handling of internal URIs Squid is
vulnerable to Exposure of Sensitive Information about
clients using the proxy. This problem allows a trusted
client to directly access cache manager information
bypassing the manager ACL protection. The available cache
manager information contains records of internal network
structure, client credentials, client identity and client
traffic behaviour.
</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2022-41317</cvename>
<url>https://github.com/squid-cache/squid/security/advisories/GHSA-rcg9-7fqm-83mq</url>
</references>
<dates>
<discovery>2022-04-17</discovery>
<entry>2022-09-26</entry>
</dates>
</vuln>
<vuln vid="f1f637d1-39eb-11ed-ab44-080027f5fec9"> <vuln vid="f1f637d1-39eb-11ed-ab44-080027f5fec9">
<topic>redis -- Potential remote code execution vulnerability</topic> <topic>redis -- Potential remote code execution vulnerability</topic>
<affects> <affects>