Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15811

EPSS 0.25% · P48
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-15811

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Squid 环境问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Squid是一套代理服务器和Web缓存服务器软件。该软件提供缓存万维网、过滤流量、代理上网等功能。 Squid 4.13 和 5.x 到 5.0.4的版本中存在安全漏洞,攻击者可以通过该漏洞获取敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-15811

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-15811

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-09-02 · 29 CVEs total

CVE-2020-24028ForLogic Qualiex 安全漏洞
CVE-2020-16150Trusted Firmware Mbed TLS 安全漏洞
CVE-2020-25073FreedomBox 安全漏洞
CVE-2020-24355Zyxel VMG5313-B30B 安全漏洞
CVE-2020-16602Razer Chroma SDK Rest Server 竞争条件问题漏洞
CVE-2020-17458MultiUx 跨站脚本漏洞
CVE-2020-24602Ignite Realtime Openfire 跨站脚本漏洞
CVE-2020-24604Ignite Realtime Openfire 跨站脚本漏洞
CVE-2020-24601Ignite Realtime Openfire 跨站脚本漏洞
CVE-2020-25079D-Link DCS-2530L和DCS-2670L 安全漏洞
CVE-2020-25078D-Link DCS-2530L和DCS-2670L 安全漏洞
CVE-2020-23830SourceCodester Stock Management System 跨站请求伪造漏洞
CVE-2020-24030ForLogic Qualiex 安全漏洞
CVE-2020-24029ForLogic Qualiex 授权问题漏洞
CVE-2020-25044Kaspersky Virus Removal Tool 安全漏洞
CVE-2020-25026TYPO3 安全漏洞
CVE-2020-25025TYPO3 安全漏洞
CVE-2020-24654KDE Ark 后置链接漏洞
CVE-2020-24553Google Golang 跨站脚本漏洞
CVE-2020-12621Android Teamwire 安全漏洞

Showing top 20 of 29 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-15811

No comments yet


Leave a comment