Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000500

Опубликовано: 26 июн. 2018
Источник: debian
EPSS Низкий

Описание

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

Пакеты

ПакетСтатусВерсия исправленияРелизТип
busyboxunfixedpackage

Примечания

  • Intentional design decision:

  • https://git.busybox.net/busybox/tree/networking/wget.c?id=8bc418f07eab79a9c8d26594629799f6157a9466#n74

  • https://git.busybox.net/busybox/commit/networking/wget.c?id=0972c7f7a570c38edb68e1c60a45614b7a7c7d55

  • Starting with 1:1.27.2-3 in unstable wget emmits a message that certificate

  • verification is not implemented.

EPSS

Процентиль: 64%
0.00485
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 7 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

CVSS3: 5.3
redhat
около 7 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

CVSS3: 8.1
nvd
около 7 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

CVSS3: 8.1
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 8.1
github
около 3 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

EPSS

Процентиль: 64%
0.00485
Низкий