Description
An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
Remediation
References
Related Vulnerabilities
Joomla! Core 1.0.x Remote File Inclusion (1.0.11 - 1.0.14)
WordPress Plugin Paid Downloads 'download_key' Parameter SQL Injection (2.01)
Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2018-1000180)
WordPress Plugin Cookie Notice & Compliance for GDPR/CCPA Cross-Site Scripting (2.1.1)
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-2854)