CVE-2012-2213
Publication date 28 April 2012
Last updated 4 August 2025
Ubuntu priority
Description
Squid 3.1.9 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br
Notes
mdeslaur
Need to check, see reproducer in original post
sbeattie
dropping to low, as it requires a specific configuration using Host header filtering also, upstream does not have a fix for this.
seth-arnold
still unable to find a configuration that could demonstrate the problem; as of 2013-01-28, no fix from upstream either.
mdeslaur
Disputed, so ignored.
References
Other references
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0165.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0163.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0146.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0140.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0131.html
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0117.html
- https://www.cve.org/CVERecord?id=CVE-2012-2213