Vulnerability Name:

CVE-2001-1030 (CCN-6862)

Assigned:2001-07-18
Published:2001-07-18
Updated:2017-10-10
Summary:Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2001-029.0
Linux - Squid configuration problems

Source: CCN
Type: BugTraq Mailing List, Wed Jul 18 2001 - 15:16:01 CDT
Squid httpd acceleration acl bug enables portscanning

Source: BUGTRAQ
Type: Patch, Vendor Advisory
20010719 TSLSA-2001-0013 - Squid

Source: MITRE
Type: CNA
CVE-2001-1030

Source: CCN
Type: Immunix OS Security Advisory IMNX-2001-70-031-01
squid

Source: IMMUNIX
Type: Patch, Vendor Advisory
IMNX-2001-70-031-01

Source: CCN
Type: Trustix Secure Linux Security Advisory #2001-0013
Squid

Source: CCN
Type: RHSA-2001-097
New squid packages for Red Hat Linux 7.0

Source: CALDERA
Type: UNKNOWN
CSSA-2001-029.0

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2001:066

Source: CCN
Type: OSVDB ID: 5476
Squid HTTP Accelerator Mode ACL Bypass

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2001:097

Source: BUGTRAQ
Type: Patch, Vendor Advisory
20010718 Squid httpd acceleration acl bug enables portscanning

Source: CCN
Type: BID-3062
Squid Web Proxy Reverse Proxy Vulnerability

Source: CCN
Type: Squid Web Proxy Cache Web site
Squid

Source: XF
Type: UNKNOWN
squid-http-accelerator-portscanning(6862)

Source: XF
Type: UNKNOWN
squid-http-accelerator-portscanning(6862)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:caldera:openlinux_server:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:immunix:immunix:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:immunix:immunix:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:squid:squid_web_proxy:2.3stable3:*:*:*:*:*:*:*
  • OR cpe:/a:squid:squid_web_proxy:2.3stable4:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.01:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.01:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    caldera openlinux server 3.1
    immunix immunix 6.2
    immunix immunix 7.0
    immunix immunix 7.0_beta
    mandrakesoft mandrake single network firewall 7.2
    squid squid web proxy 2.3stable3
    squid squid web proxy 2.3stable4
    mandrakesoft mandrake linux 7.1
    mandrakesoft mandrake linux 7.2
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake linux corporate server 1.0.1
    redhat linux 7.0
    trustix secure linux 1.01
    trustix secure linux 1.1
    trustix secure linux 1.2
    mandrakesoft mandrake linux 7.1
    freebsd ports collection *
    trustix secure linux 1.1
    redhat linux 7
    mandrakesoft mandrake linux 7.2
    mandrakesoft mandrake linux corporate server 1.0.1
    trustix secure linux 1.01
    trustix secure linux 1.2
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake single network firewall 7.2