Description
An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.
Remediation
References
Related Vulnerabilities
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-0211)
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2012-1171)
WordPress Plugin Rezgo Cross-Site Scripting (1.4.2)
WordPress Plugin Stripe Payment for WooCommerce Security Bypass (3.7.7)
WordPress Plugin WP-Stats 'author' Parameter SQL Injection (2.0)