Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-10524

Опубликовано: 19 нояб. 2024
Источник: debian
EPSS Низкий

Описание

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wgetfixed1.25.0-1package
wgetno-dsabookwormpackage
wgetignoredbullseyepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2024/11/18/6

  • https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/

  • Fixed by: https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778 (v1.25.0)

EPSS

Процентиль: 63%
0.00436
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

CVSS3: 6.5
redhat
больше 1 года назад

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

CVSS3: 6.5
nvd
больше 1 года назад

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

CVSS3: 6.5
msrc
больше 1 года назад

GNU Wget is vulnerable to an SSRF attack when accessing partially-user-controlled shorthand URLs

suse-cvrf
10 месяцев назад

Security update for wget

EPSS

Процентиль: 63%
0.00436
Низкий