Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-54574 PoC — Squid 安全漏洞

Source
Associated Vulnerability
Title:Squid 安全漏洞 (CVE-2025-54574)
Description:Squid是Squid开源的一套代理服务器和Web缓存服务器软件。该软件提供缓存万维网、过滤流量、代理上网等功能。 Squid 6.3及之前版本存在安全漏洞,该漏洞源于处理URN时存在堆缓冲区溢出,可能导致远程代码执行。
Description
Vulnerability Found on Squid Proxy.
Readme
# CVE-2025-54574-Squid-Heap-Buffer-Overflow
Vulnerability Found on Squid Proxy.
CVE-2025-54574 — Critical Heap Buffer Overflow in Squid Proxy

This repository documents the discovery, analysis, and responsible disclosure process of CVE-2025-54574, a critical heap-based buffer overflow in Squid (<6.4) triggered during URN Trivial-HTTP response handling.

The vulnerability allowed an attacker-controlled server to cause out-of-bounds heap writes, memory corruption, and potential disclosure of up to 4KB of heap memory, including sensitive information.

📌 Severity: Critical (CVSS 9.3)
📌 Weakness: CWE-122
📌 Fixed in: Squid 6.4
📌 Discovered by: Guadalupe Colantonio (StarryNight)

🔍 Contents

/analysis/ → Technical explanation and memory analysis

/poc/ → Safe reproduction steps

/logs/ → Sanitized ASan & Valgrind outputs

README.md → Advisory summary

🧠 Summary of the Vulnerability

Due to improper buffer management in Squid’s URN processing subsystem, oversized responses could overflow a fixed-size heap buffer (~4096 bytes). This resulted in memory corruption and unintentional disclosure of heap content.

The bug affected all Squid versions up to 6.3, across multiple Linux distributions shipping outdated builds.

📅 Disclosure Timeline

2025-07-01 — Initial private report

2025-07-02 → 07-29 — Verification & maintainer coordination

2025-07-30 — CVE assigned

2025-07-31 — Advisory published

2025-08-xx — Patch included in Squid 6.4

📄 Official Advisory

GHSA-w4gv-vw3f-29g3
CVE-2025-54574

👤 Author

Guadalupe Colantonio — Security Researcher
🔗 GitHub: your username
📧 colantonioguadalupe@gmail.com
File Snapshot

[4.0K] /data/pocs/78bd2ea3c71b5ef72f474a2d580e6b754b35a2a0 └── [1.6K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.