{"id":"CVE-2023-50269","summary":"SQUID-2023:10 Denial of Service in HTTP Request parsing","details":"Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives.","aliases":["GHSA-wgq4-4cfg-c4x3"],"modified":"2026-04-16T04:33:58.485012160Z","published":"2023-12-14T17:09:25.168Z","related":["ALSA-2024:1375","ALSA-2024:1376","SUSE-SU-2024:0296-1","SUSE-SU-2024:0298-1","SUSE-SU-2024:0455-1","openSUSE-SU-2024:13631-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/50xxx/CVE-2023-50269.json","cwe_ids":["CWE-674"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch"},{"type":"WEB","url":"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/50xxx/CVE-2023-50269.json"},{"type":"ADVISORY","url":"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-50269"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240119-0005/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/squid-cache/squid","events":[{"introduced":"f188960023551b2e9cb2a9df245b92bfeef37056"},{"last_affected":"20d1c7236c7493b1f8b7e47f2e2afc529232071c"}],"database_specific":{"versions":[{"introduced":"3.1"},{"last_affected":"5.9"}]}},{"type":"GIT","repo":"https://github.com/squid-cache/squid","events":[{"introduced":"ef1e128ce5a9733ae57d6595806bb832de389446"},{"fixed":"e8118a7381213f5cfcdeb4cec1d2d854bfd261c8"}],"database_specific":{"versions":[{"introduced":"6.0.1"},{"fixed":"6.6"}]}}],"versions":["SQUID_6_0_1","SQUID_6_0_2","SQUID_6_0_3","SQUID_6_1","SQUID_6_2","SQUID_6_3","SQUID_6_4","SQUID_6_5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-50269.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}]}