Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4971

Опубликовано: 09 июн. 2016
Источник: redhat
CVSS3: 7
CVSS2: 6.8

Описание

GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.

It was found that wget used a file name provided by the server for the downloaded file when following a HTTP redirect to a FTP server resource. This could cause wget to create a file with a different name than expected, possibly allowing the server to execute arbitrary code on the client.

Меры по смягчению последствий

Use wget with "-O" option to explicitly specify the output filename.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wgetWill not fix
Red Hat Enterprise Linux 6wgetWill not fix
Red Hat Enterprise Linux 7wgetFixedRHSA-2016:258703.11.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-73
https://bugzilla.redhat.com/show_bug.cgi?id=1343666wget: Lack of filename checking allows arbitrary file upload via FTP redirect

7 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 9 лет назад

GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.

CVSS3: 8.8
nvd
около 9 лет назад

GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.

CVSS3: 8.8
debian
около 9 лет назад

GNU wget before 1.18 allows remote servers to write to arbitrary files ...

CVSS3: 8.8
github
больше 3 лет назад

GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.

oracle-oval
почти 9 лет назад

ELSA-2016-2587: wget security and bug fix update (MODERATE)

7 High

CVSS3

6.8 Medium

CVSS2