关联漏洞
标题:Squid 安全漏洞 (CVE-2025-54574)描述:Squid是Squid开源的一套代理服务器和Web缓存服务器软件。该软件提供缓存万维网、过滤流量、代理上网等功能。 Squid 6.3及之前版本存在安全漏洞,该漏洞源于处理URN时存在堆缓冲区溢出,可能导致远程代码执行。
描述
Vulnerability Found on Squid Proxy.
介绍
# CVE-2025-54574-Squid-Heap-Buffer-Overflow
Vulnerability Found on Squid Proxy.
CVE-2025-54574 — Critical Heap Buffer Overflow in Squid Proxy
This repository documents the discovery, analysis, and responsible disclosure process of CVE-2025-54574, a critical heap-based buffer overflow in Squid (<6.4) triggered during URN Trivial-HTTP response handling.
The vulnerability allowed an attacker-controlled server to cause out-of-bounds heap writes, memory corruption, and potential disclosure of up to 4KB of heap memory, including sensitive information.
📌 Severity: Critical (CVSS 9.3)
📌 Weakness: CWE-122
📌 Fixed in: Squid 6.4
📌 Discovered by: Guadalupe Colantonio (StarryNight)
🔍 Contents
/analysis/ → Technical explanation and memory analysis
/poc/ → Safe reproduction steps
/logs/ → Sanitized ASan & Valgrind outputs
README.md → Advisory summary
🧠 Summary of the Vulnerability
Due to improper buffer management in Squid’s URN processing subsystem, oversized responses could overflow a fixed-size heap buffer (~4096 bytes). This resulted in memory corruption and unintentional disclosure of heap content.
The bug affected all Squid versions up to 6.3, across multiple Linux distributions shipping outdated builds.
📅 Disclosure Timeline
2025-07-01 — Initial private report
2025-07-02 → 07-29 — Verification & maintainer coordination
2025-07-30 — CVE assigned
2025-07-31 — Advisory published
2025-08-xx — Patch included in Squid 6.4
📄 Official Advisory
GHSA-w4gv-vw3f-29g3
CVE-2025-54574
👤 Author
Guadalupe Colantonio — Security Researcher
🔗 GitHub: your username
📧 colantonioguadalupe@gmail.com
文件快照
[4.0K] /data/pocs/78bd2ea3c71b5ef72f474a2d580e6b754b35a2a0
└── [1.6K] README.md
1 directory, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。