security/vuxml: Document exposure of sensitive information in cache manager of squid
This commit is contained in:
parent
3f586f68b2
commit
f68c3880c6
1 changed files with 35 additions and 0 deletions
|
@ -1,3 +1,38 @@
|
||||||
|
<vuln vid="f9ada0b5-3d80-11ed-9330-080027f5fec9">
|
||||||
|
<topic>squid -- Exposure of sensitive information in cache manager</topic>
|
||||||
|
<affects>
|
||||||
|
<package>
|
||||||
|
<name>squid</name>
|
||||||
|
<range><lt>5.7</lt></range>
|
||||||
|
</package>
|
||||||
|
</affects>
|
||||||
|
<description>
|
||||||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||||
|
<p>Mikhail Evdokimov (aka konata) reports:</p>
|
||||||
|
<blockquote cite="https://github.com/squid-cache/squid/security/advisories/GHSA-rcg9-7fqm-83mq">
|
||||||
|
<p>
|
||||||
|
Due to inconsistent handling of internal URIs Squid is
|
||||||
|
vulnerable to Exposure of Sensitive Information about
|
||||||
|
clients using the proxy. This problem allows a trusted
|
||||||
|
client to directly access cache manager information
|
||||||
|
bypassing the manager ACL protection. The available cache
|
||||||
|
manager information contains records of internal network
|
||||||
|
structure, client credentials, client identity and client
|
||||||
|
traffic behaviour.
|
||||||
|
</p>
|
||||||
|
</blockquote>
|
||||||
|
</body>
|
||||||
|
</description>
|
||||||
|
<references>
|
||||||
|
<cvename>CVE-2022-41317</cvename>
|
||||||
|
<url>https://github.com/squid-cache/squid/security/advisories/GHSA-rcg9-7fqm-83mq</url>
|
||||||
|
</references>
|
||||||
|
<dates>
|
||||||
|
<discovery>2022-04-17</discovery>
|
||||||
|
<entry>2022-09-26</entry>
|
||||||
|
</dates>
|
||||||
|
</vuln>
|
||||||
|
|
||||||
<vuln vid="f1f637d1-39eb-11ed-ab44-080027f5fec9">
|
<vuln vid="f1f637d1-39eb-11ed-ab44-080027f5fec9">
|
||||||
<topic>redis -- Potential remote code execution vulnerability</topic>
|
<topic>redis -- Potential remote code execution vulnerability</topic>
|
||||||
<affects>
|
<affects>
|
||||||
|
|
Loading…
Reference in a new issue