支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: 78bd2ea3c71b5ef72f474a2d580e6b754b35a2a0

来源
关联漏洞
标题:Squid 安全漏洞 (CVE-2025-54574)
描述:Squid是Squid开源的一套代理服务器和Web缓存服务器软件。该软件提供缓存万维网、过滤流量、代理上网等功能。 Squid 6.3及之前版本存在安全漏洞,该漏洞源于处理URN时存在堆缓冲区溢出,可能导致远程代码执行。
描述
Vulnerability Found on Squid Proxy.
介绍
# CVE-2025-54574-Squid-Heap-Buffer-Overflow
Vulnerability Found on Squid Proxy.
CVE-2025-54574 — Critical Heap Buffer Overflow in Squid Proxy

This repository documents the discovery, analysis, and responsible disclosure process of CVE-2025-54574, a critical heap-based buffer overflow in Squid (<6.4) triggered during URN Trivial-HTTP response handling.

The vulnerability allowed an attacker-controlled server to cause out-of-bounds heap writes, memory corruption, and potential disclosure of up to 4KB of heap memory, including sensitive information.

📌 Severity: Critical (CVSS 9.3)
📌 Weakness: CWE-122
📌 Fixed in: Squid 6.4
📌 Discovered by: Guadalupe Colantonio (StarryNight)

🔍 Contents

/analysis/ → Technical explanation and memory analysis

/poc/ → Safe reproduction steps

/logs/ → Sanitized ASan & Valgrind outputs

README.md → Advisory summary

🧠 Summary of the Vulnerability

Due to improper buffer management in Squid’s URN processing subsystem, oversized responses could overflow a fixed-size heap buffer (~4096 bytes). This resulted in memory corruption and unintentional disclosure of heap content.

The bug affected all Squid versions up to 6.3, across multiple Linux distributions shipping outdated builds.

📅 Disclosure Timeline

2025-07-01 — Initial private report

2025-07-02 → 07-29 — Verification & maintainer coordination

2025-07-30 — CVE assigned

2025-07-31 — Advisory published

2025-08-xx — Patch included in Squid 6.4

📄 Official Advisory

GHSA-w4gv-vw3f-29g3
CVE-2025-54574

👤 Author

Guadalupe Colantonio — Security Researcher
🔗 GitHub: your username
📧 colantonioguadalupe@gmail.com
文件快照

[4.0K] /data/pocs/78bd2ea3c71b5ef72f474a2d580e6b754b35a2a0 └── [1.6K] README.md 1 directory, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。