Squid Cache vulnerability
6,4
Medium
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Squid Cache vulnerability
Code name
State
Published
Affected product
Squid Cache
Vulnerability name
Double-Free/Arbitrary code execution
Vulnerability type
Remotely exploitable
No
CVSS v3.1 vector string
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v3.1 base score
6.4
Exploit available
Yes
CVE ID(s)
Pending
Description
A Double-Free bug was found in Squid versions up to 4.14 and 5.0.5 when processing the acl
directive on configuration files, more specifically the first and second addresses.
This may allow arbitrary code execution on a Squid deployment on where the configuration files may be processed from untrusted sources.
Proof of Concept
Create a file with the following contents: heap.conf
Run squid
as:
These are the values of the CPU registers at the moment of the crash
And the execution stops at:
As the value of RAX
is populated using the malicious input configuration, arbitrary command execution is achieved at 0x555555af55e7
.
Mitigation
By 2021-03-17 there is not a patch resolving the issue.
References
Vendor page http://www.squid-cache.org/
Full Disclosure announcement https://seclists.org/fulldisclosure/2021/Feb/80
Timeline
IA generativa
8 feb 2021
Vendor requested re-testing
22 feb 2021
Vendor contacted
9 feb 2021
Follow-up with vendor
22 feb 2021
Vendor replied
10 feb 2021
Public disclosure
24 feb 2021