client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "squid", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squid-cgi", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squid-cgi-dbgsym", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squid-dbgsym", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squid-purge", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squid-purge-dbgsym", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squid3", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squid3-common", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squid3-dbg", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squid3-dbgsym", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squidclient", "binary_version": "3.3.8-1ubuntu6.8" }, { "binary_name": "squidclient-dbgsym", "binary_version": "3.3.8-1ubuntu6.8" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "squid", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squid-cgi", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squid-cgi-dbgsym", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squid-common", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squid-dbg", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squid-dbgsym", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squid-purge", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squid-purge-dbgsym", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squid3", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squidclient", "binary_version": "3.5.12-1ubuntu7.2" }, { "binary_name": "squidclient-dbgsym", "binary_version": "3.5.12-1ubuntu7.2" } ] }