Page 3 of 20 results (0.012 seconds)

CVSS: 9.3EPSS: 7%CPEs: 8EXPL: 2

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink. Vulnerabilidad de salto de ruta absoluta en GNU Wget anterior a 1.16, cuando la recursión esta habilitada, permite a servidores FTP remotos escribir a ficheros arbitrarios, y como consecuencia ejecutar código arbitrario, a través de una respuesta LIST que hace referencia al mismo nombre de fichero dentro de dos entradas, una de las cuales indica que el nombre de fichero es para un enlace simbólico. A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode (using the '-m' command line option) to write an arbitrary file to a location writable to by the user running Wget, possibly leading to code execution. • http://advisories.mageia.org/MGASA-2014-0431.html http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7 http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0 http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html http://lists.opensuse.org/opensuse-updates/2014-11/msg0002 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 6.8EPSS: 0%CPEs: 18EXPL: 0

GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory. GNU Wget v1.12 y anteriores usan un nombre de fichero proporcionado por el servidor en lugar de la URL original para determinar el nombre de fichero destino de una descarga, lo que permite a servidores remotos crear o sobreescribir ficheros de su elección a través de redirecciones 3xx en una URL con nombre de fichero .wgetrc seguido por la redirección 3xx en una URL con un nombre de fichero manipulado, y probablemente ejecutar código de su elección como consecuencia de escribir un fichero punto en un directorio home. • http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00023.html http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00031.html http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00032.html http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00033.html http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00034.html http://marc.info/?l=oss-security&m=127411372529485&w=2 http://marc.info/?l=oss-security&m=127412569216380&w=2 http://marc.info/ • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 0%CPEs: 16EXPL: 0

GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. GNU Wget, en versiones anteriores a la 1.12 no maneja adecuadamente un caracter '\0' en un nombre de dominio, en el campo Common Name de una certificado X.509, lo cual permite a atacantes hombre-en-el-medio (man-in-the-middle) remotos suplantar servidores SSL a su elección a través de de un certificado manipulado expedido por una Autoridad de Certificación legítima, un tema relacionado con CVE-2009-2408. • http://addictivecode.org/pipermail/wget-notify/2009-August/001808.html http://hg.addictivecode.org/wget/mainline/rev/1eab157d3be7 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://marc.info/?l=oss-security&m=125198917018936&w=2 http://marc.info/?l=oss-security&m=125369675820512&w=2 http://permalink.gmane.org/gmane.comp.web.wget.general/8972 http://secunia.com/advisories/36540 http://www.securityfocus.com/bid/36205 http://www.vupen.com/english/advisories/20 • CWE-310: Cryptographic Issues •

CVSS: 5.0EPSS: 3%CPEs: 12EXPL: 2

The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command. La función ftp_syst en ftp-basic.c en Free Software Foundation (FSF) GNU wget 1.10.2 permite a un atacante remoto provocar denegación de servicio (caida de aplicación) a través de un servidor FTP malicioso con un gran número de respuestas 220 en blanco al comando SYST. • https://www.exploit-db.com/exploits/2947 http://www.mandriva.com/security/advisories?name=MDKSA-2007:017 http://www.securityfocus.com/bid/21650 https://issues.rpath.com/browse/RPL-930 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt http://docs.info.apple.com/article.html?artnum=302847 http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html http://secunia.com/advisories/17192 http://secunia.com/advisories/17193 http://secunia.com/advisories/17203 http://secunia.com/advisories/17208 http://secunia.com/advisories/17228 http://secunia.com/advisories/17247 http://secunia.com/advisories/17297 http://secunia.com/adviso • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •