Description
Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-286-1 | squid3 security update |
Debian DSA |
DSA-3327-1 | squid3 security update |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T06:50:02.095Z
Reserved: 2015-07-06T00:00:00.000Z
Link: CVE-2015-5400
No data.
Status : Modified
Published: 2015-09-28T20:59:03.280
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-5400
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA