Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-31879

Опубликовано: 04 окт. 2019
Источник: redhat
CVSS3: 6.5

Описание

GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.

A flaw was found in wget. If wget sends an Authorization header as part of a query and receives an HTTP REDIRECT to a third party in return, the Authorization header will be forwarded as part of the redirected request. This issue creates a password leak, as the second server receives the password. The highest threat from this vulnerability is confidentiality.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Access to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.

Меры по смягчению последствий

Use --max-redirect 0 when the request contains Authorization header to prevent wget to redirect the request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6wgetOut of support scope
Red Hat Enterprise Linux 7wgetOut of support scope
Red Hat Enterprise Linux 8wgetAffected
Red Hat Enterprise Linux 9wgetAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1955316wget: authorization header disclosure on redirect

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 5 лет назад

GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.

CVSS3: 6.1
nvd
почти 5 лет назад

GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.

CVSS3: 6.1
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 6.1
debian
почти 5 лет назад

GNU Wget through 1.21.1 does not omit the Authorization header upon a ...

suse-cvrf
12 месяцев назад

Security update for wget

6.5 Medium

CVSS3