Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0710: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a

0
High
VulnerabilityCVE-1999-0710cve-1999-0710
Published: Sun Jul 25 1999 (07/25/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: redhat
Product: linux

Description

The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.

AI-Powered Analysis

AILast updated: 06/27/2025, 19:10:06 UTC

Technical Analysis

CVE-1999-0710 is a high-severity vulnerability affecting the Squid caching proxy package as distributed in Red Hat Linux versions 5.2 and 6.0, as well as other Linux distributions from that era. The vulnerability arises because the Squid package installs the cachemgr.cgi script in a publicly accessible web directory without adequate access controls. This CGI script is intended for cache management and monitoring but can be exploited by remote attackers as an open proxy or intermediary to connect to other systems. Since the script is accessible over the network without authentication, an attacker can leverage it to relay requests, potentially masking their origin or accessing internal network resources indirectly. The vulnerability has a CVSS v2 score of 7.5, reflecting its network accessibility (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (C:P/I:P/A:P). Although no known exploits are reported in the wild, the presence of this script in a public directory poses a significant risk of misuse. A patch is available from Fedora updates, and applying it or removing/limiting access to cachemgr.cgi is critical to mitigating this threat. Given the age of the affected versions, this vulnerability primarily concerns legacy systems that have not been updated or decommissioned.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial if legacy Red Hat Linux 5.2 or 6.0 systems with Squid proxy are still in use, particularly in environments where these proxies are exposed to untrusted networks or the internet. Exploitation could allow attackers to use the vulnerable proxy as a stepping stone to access internal systems, bypass network controls, or anonymize malicious activities. This could lead to unauthorized data disclosure, modification of cached content, or disruption of proxy services, affecting confidentiality, integrity, and availability. Organizations in sectors with strict data protection regulations such as finance, healthcare, and government could face compliance risks and reputational damage if exploited. Additionally, the ability to pivot through the proxy could facilitate further attacks within the network. However, the impact is mitigated by the fact that this vulnerability affects very old Linux versions, which are unlikely to be widely deployed in modern European IT environments.

Mitigation Recommendations

European organizations should first identify any legacy systems running Red Hat Linux 5.2, 6.0, or other affected distributions with Squid installed. Immediate mitigation steps include applying the official patches available from Fedora update repositories to remove or secure the cachemgr.cgi script. If patching is not feasible, organizations should restrict access to the cachemgr.cgi script by removing it from public web directories or configuring web server access controls to limit usage to trusted administrators only. Network-level controls such as firewall rules should be implemented to block external access to the Squid management interface. Additionally, organizations should consider upgrading legacy systems to supported Linux versions with updated Squid packages. Regular vulnerability scanning and monitoring for unusual proxy usage patterns can help detect exploitation attempts. Finally, documenting and decommissioning outdated systems will reduce exposure to this and similar legacy vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df115

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 7:10:06 PM

Last updated: 2/7/2026, 8:58:59 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats