Bug 1770365 (CVE-2019-18677) - CVE-2019-18677 squid: Cross-Site Request Forgery issue in HTTP Request processing
Summary: CVE-2019-18677 squid: Cross-Site Request Forgery issue in HTTP Request proces...
Status: NEW
Alias: CVE-2019-18677
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1770367 1771279 1771280
Blocks: 1770369
TreeView+ depends on / blocked
Reported: 2019-11-08 19:56 UTC by Pedro Sampaio
Modified: 2019-12-12 00:20 UTC (History)
5 users (show)

Fixed In Version: squid 4.9
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Pedro Sampaio 2019-11-08 19:56:48 UTC
Due to incorrect message processing Squid configured with append_domain can inappropriately redirect traffic to origins it should not be delivered to.



Comment 1 Pedro Sampaio 2019-11-08 19:57:05 UTC
Created squid tracking bugs for this issue:

Affects: fedora-all [bug 1770367]

Comment 3 Huzaifa S. Sidhpurwala 2019-11-12 05:45:35 UTC
External References:


Comment 4 Huzaifa S. Sidhpurwala 2019-11-12 05:45:40 UTC

As per upstream:

Remove append_domain configuration settings from squid.conf.
The append_domain feature is redundant when /etc/resolv.conf  is used to determine hostnames. However, please note that use of /etc/resolv.conf may require removal of dns_nameservers and other redundant DNS directives.

Note You need to log in before you can comment on or make changes to this bug.