CVE-2025-62168

10.0 CRITICAL

📋 TL;DR

Squid caching proxy versions before 7.2 fail to properly redact HTTP authentication credentials in error messages, allowing information disclosure. This vulnerability enables scripts to bypass browser security protections and learn credentials used by trusted clients, potentially exposing security tokens or internal authentication data. Any organization using vulnerable Squid versions for web application load balancing or proxy services is affected.

💻 Affected Systems

Products:
  • Squid caching proxy
Versions: All versions prior to 7.2
Operating Systems: All operating systems running Squid
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Squid configurations, even those not using HTTP authentication. Particularly impacts deployments using Squid for backend load balancing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal authentication credentials or security tokens, gaining unauthorized access to backend systems, internal applications, or sensitive data.

🟠

Likely Case

Credential leakage leading to unauthorized access to web applications or services behind the Squid proxy.

🟢

If Mitigated

Limited information disclosure with minimal impact if proper network segmentation and credential rotation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires triggering error conditions in Squid to leak credentials through error messages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2

Vendor Advisory: https://github.com/squid-cache/squid/security/advisories/GHSA-c8cc-phh7-xmxr

Restart Required: Yes

Instructions:

1. Download Squid 7.2 or later from squid-cache.org. 2. Stop Squid service. 3. Install/upgrade to version 7.2+. 4. Restart Squid service.

🔧 Temporary Workarounds

Disable debug information in error emails

all

Prevents credential leakage through administrator mailto links by disabling email error data

Add 'email_err_data off' to squid.conf and restart Squid

🧯 If You Can't Patch

  • Implement network segmentation to isolate Squid instances from sensitive backend systems
  • Rotate all authentication credentials and tokens used by applications behind Squid

🔍 How to Verify

Check if Vulnerable:

Check Squid version with 'squid -v' or 'squid --version' and verify it's below 7.2

Check Version:

squid -v

Verify Fix Applied:

Confirm version is 7.2 or higher with 'squid -v' and check squid.conf contains 'email_err_data off'

📡 Detection & Monitoring

Log Indicators:

  • Unusual error messages containing authentication data
  • Multiple failed authentication attempts triggering error conditions

Network Indicators:

  • Unexpected HTTP error responses containing credential-like strings
  • Traffic patterns suggesting credential harvesting

SIEM Query:

source="squid" AND (message="*error*" OR message="*auth*") AND (message="*password*" OR message="*token*" OR message="*credential*")

🔗 References

📤 Share & Export