CVE-2012-2213
Publication date 28 April 2012
Last updated 24 July 2024
Ubuntu priority
** DISPUTED ** Squid 3.1.9 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br.
Notes
mdeslaur
Need to check, see reproducer in original post
sbeattie
dropping to low, as it requires a specific configuration using Host header filtering also, upstream does not have a fix for this.
seth-arnold
still unable to find a configuration that could demonstrate the problem; as of 2013-01-28, no fix from upstream either.
mdeslaur
Disputed, so ignored.
References
Other references
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0165.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0163.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0146.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0140.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0131.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0117.html
- https://www.cve.org/CVERecord?id=CVE-2012-2213