Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-4877

Опубликовано: 27 окт. 2014
Источник: redhat
CVSS2: 4.3

Описание

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode (using the '-m' command line option) to write an arbitrary file to a location writable to by the user running Wget, possibly leading to code execution.

Отчет

Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wgetWill not fix
Red Hat Enterprise Linux 6wgetFixedRHSA-2014:176430.10.2014
Red Hat Enterprise Linux 6.5 Extended Update SupportwgetFixedRHSA-2014:195503.12.2014
Red Hat Enterprise Linux 7wgetFixedRHSA-2014:176430.10.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=1139181wget: FTP symlink arbitrary filesystem access

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

nvd
почти 11 лет назад

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

debian
почти 11 лет назад

Absolute path traversal vulnerability in GNU Wget before 1.16, when re ...

github
больше 3 лет назад

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

oracle-oval
почти 11 лет назад

ELSA-2014-1764: wget security update (MODERATE)

4.3 Medium

CVSS2