Описание
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-1487
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18420
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11682
- https://usn.ubuntu.com/145-1
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755
- http://marc.info/?l=bugtraq&m=110269474112384&w=2
- http://securitytracker.com/id?1012472
- http://www.redhat.com/support/errata/RHSA-2005-771.html
- http://www.securityfocus.com/bid/11871
EPSS
CVE ID
Связанные уязвимости
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite ...
EPSS