Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.100765
Category:Web Servers
Title:Squid Request/Response Smuggling Vulnerability (GHSA-j83v-w3p4-5cqh, SQUID-2023:1)
Summary:Squid is prone to a request/response smuggling vulnerability.
Description:Summary:
Squid is prone to a request/response smuggling vulnerability.

Vulnerability Insight:
Due to chunked decoder lenience Squid is vulnerable to
Request/Response smuggling attacks when parsing HTTP/1.1 and ICAP messages.

Affected Software/OS:
Squid versions 2.6 through 6.3.

Solution:
Update to version 6.4 or later.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-46846
RHBZ#2245910
https://bugzilla.redhat.com/show_bug.cgi?id=2245910
RHSA-2023:6266
https://access.redhat.com/errata/RHSA-2023:6266
RHSA-2023:6267
https://access.redhat.com/errata/RHSA-2023:6267
RHSA-2023:6268
https://access.redhat.com/errata/RHSA-2023:6268
RHSA-2023:6748
https://access.redhat.com/errata/RHSA-2023:6748
RHSA-2023:6801
https://access.redhat.com/errata/RHSA-2023:6801
RHSA-2023:6803
https://access.redhat.com/errata/RHSA-2023:6803
RHSA-2023:6804
https://access.redhat.com/errata/RHSA-2023:6804
RHSA-2023:6810
https://access.redhat.com/errata/RHSA-2023:6810
RHSA-2023:7213
https://access.redhat.com/errata/RHSA-2023:7213
https://access.redhat.com/security/cve/CVE-2023-46846
https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh
https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00008.html
https://security.netapp.com/advisory/ntap-20231130-0002/
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.