CVE-2016-4553

Source
https://cve.org/CVERecord?id=CVE-2016-4553
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4553.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-4553
Downstream
Related
Published
2016-05-10T19:59:00.137Z
Modified
2026-04-16T01:39:54.339383084Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.04"
                }
            ],
            "cpe": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "14.04"
                }
            ],
            "cpe": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "15.10"
                }
            ],
            "cpe": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "16.04"
                }
            ],
            "cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7"
                }
            ],
            "cpe": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
        }
    ]
}
References

Affected packages

Git / github.com/squid-cache/squid

Affected ranges

Type
GIT
Repo
https://github.com/squid-cache/squid
Events
Database specific
{
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "3.5.17"
        },
        {
            "last_affected": "4.0.1"
        },
        {
            "last_affected": "4.0.2"
        },
        {
            "last_affected": "4.0.3"
        },
        {
            "last_affected": "4.0.4"
        },
        {
            "last_affected": "4.0.5"
        },
        {
            "last_affected": "4.0.6"
        },
        {
            "last_affected": "4.0.7"
        },
        {
            "last_affected": "4.0.8"
        },
        {
            "last_affected": "4.0.9"
        }
    ],
    "cpe": [
        "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
        "cpe:2.3:a:squid-cache:squid:4.0.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:squid-cache:squid:4.0.2:*:*:*:*:*:*:*",
        "cpe:2.3:a:squid-cache:squid:4.0.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:squid-cache:squid:4.0.4:*:*:*:*:*:*:*",
        "cpe:2.3:a:squid-cache:squid:4.0.5:*:*:*:*:*:*:*",
        "cpe:2.3:a:squid-cache:squid:4.0.6:*:*:*:*:*:*:*",
        "cpe:2.3:a:squid-cache:squid:4.0.7:*:*:*:*:*:*:*",
        "cpe:2.3:a:squid-cache:squid:4.0.8:*:*:*:*:*:*:*",
        "cpe:2.3:a:squid-cache:squid:4.0.9:*:*:*:*:*:*:*"
    ]
}

Affected versions

Other
HISTORIC_RELEASES
SQUID_3_0_PRE1
SQUID_3_0_PRE2
SQUID_3_0_PRE3
SQUID_3_0_PRE4
SQUID_3_0_PRE5
SQUID_3_0_PRE6
SQUID_3_0_PRE7
SQUID_3_0_RC1
SQUID_3_5_0_1
SQUID_3_5_0_2
SQUID_3_5_0_3
SQUID_3_5_0_4
SQUID_3_5_1
SQUID_3_5_10
SQUID_3_5_11
SQUID_3_5_12
SQUID_3_5_13
SQUID_3_5_14
SQUID_3_5_15
SQUID_3_5_16
SQUID_3_5_17
SQUID_3_5_2
SQUID_3_5_3
SQUID_3_5_4
SQUID_3_5_5
SQUID_3_5_6
SQUID_3_5_7
SQUID_3_5_8
SQUID_3_5_9
SQUID_4_0_1
SQUID_4_0_2
SQUID_4_0_3
SQUID_4_0_4
SQUID_4_0_5
SQUID_4_0_6
SQUID_4_0_7
SQUID_4_0_8
SQUID_4_0_9
take00

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4553.json"