Squid


Nmap discovered a Squid service on the target port 3128 The running is service is Squid http proxy 4.14

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/squid]
└─$ curl -I -X OPTIONS http://$IP:3128/   
HTTP/1.1 400 Bad Request
Server: squid/4.14
Mime-Version: 1.0
Date: Thu, 10 Apr 2025 10:10:47 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3394
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from SQUID
Via: 1.1 SQUID (squid/4.14)
Connection: close
 
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/squid]
└─$ curl -I http://$IP:3128/        
HTTP/1.1 400 Bad Request
Server: squid/4.14
Mime-Version: 1.0
Date: Thu, 10 Apr 2025 10:10:52 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3394
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from SQUID
Via: 1.1 SQUID (squid/4.14)
Connection: close

Webroot It’s a Squid HTTP Proxy server

Squid is a caching and forwarding HTTP web proxy. It has a wide variety of uses, including speeding up a web server by caching repeated requests, caching World Wide Web (WWW), Domain Name System (DNS), and other network lookups for a group of people sharing network resources, and aiding security by filtering traffic. Although used for mainly HTTP and File Transfer Protocol (FTP), Squid includes limited support for several other protocols including Internet Gopher, Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Hypertext Transfer Protocol Secure (HTTPS). Squid does not support the SOCKS protocol, unlike Privoxy, with which Squid can be used in order to provide SOCKS support. Source code is available for review

Since this is a proxy, I can leverage this to access the internal services

Version Information


The version information is disclosed at the footer; 4.14

Vulnerabilities


Looking it up online reveals a vulnerability; CVE-2021-28116 N/A