Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-10524

Опубликовано: 19 нояб. 2024
Источник: debian
EPSS Низкий

Описание

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wgetfixed1.25.0-1package
wgetno-dsabookwormpackage
wgetignoredbullseyepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2024/11/18/6

  • https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/

  • Fixed by: https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778 (v1.25.0)

EPSS

Процентиль: 62%
0.00436
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 1 года назад

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

CVSS3: 6.5
redhat
около 1 года назад

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

CVSS3: 6.5
nvd
около 1 года назад

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

CVSS3: 6.5
msrc
около 1 года назад

Описание отсутствует

suse-cvrf
7 месяцев назад

Security update for wget

EPSS

Процентиль: 62%
0.00436
Низкий