CVE-2010-2252
wget: multiple HTTP client download filename vulnerability [OCERT 2010-001]
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
GNU Wget v1.12 y anteriores usan un nombre de fichero proporcionado por el servidor en lugar de la URL original para determinar el nombre de fichero destino de una descarga, lo que permite a servidores remotos crear o sobreescribir ficheros de su elección a través de redirecciones 3xx en una URL con nombre de fichero .wgetrc seguido por la redirección 3xx en una URL con un nombre de fichero manipulado, y probablemente ejecutar código de su elección como consecuencia de escribir un fichero punto en un directorio home.
The wget package provides the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. Wget provides various useful features, such as the ability to work in the background while the user is logged out, recursive retrieval of directories, file name wildcard matching or updating files in dependency on file timestamp comparison. It was discovered that wget used a file name provided by the server when saving a downloaded file. This could cause wget to create a file with a different name than expected, possibly allowing the server to execute arbitrary code on the client.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-06-09 CVE Reserved
- 2010-07-06 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (19)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0151.html | 2016-11-28 | |
https://bugzilla.redhat.com/show_bug.cgi?id=602797 | 2014-02-10 | |
https://access.redhat.com/security/cve/CVE-2010-2252 | 2014-02-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | <= 1.12 Search vendor "Gnu" for product "Wget" and version " <= 1.12" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.5.3 Search vendor "Gnu" for product "Wget" and version "1.5.3" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.6 Search vendor "Gnu" for product "Wget" and version "1.6" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.7 Search vendor "Gnu" for product "Wget" and version "1.7" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.7.1 Search vendor "Gnu" for product "Wget" and version "1.7.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.8 Search vendor "Gnu" for product "Wget" and version "1.8" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.8.1 Search vendor "Gnu" for product "Wget" and version "1.8.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.8.2 Search vendor "Gnu" for product "Wget" and version "1.8.2" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.9 Search vendor "Gnu" for product "Wget" and version "1.9" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.9.1 Search vendor "Gnu" for product "Wget" and version "1.9.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.10 Search vendor "Gnu" for product "Wget" and version "1.10" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.10.1 Search vendor "Gnu" for product "Wget" and version "1.10.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.10.2 Search vendor "Gnu" for product "Wget" and version "1.10.2" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.11 Search vendor "Gnu" for product "Wget" and version "1.11" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.11.1 Search vendor "Gnu" for product "Wget" and version "1.11.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.11.2 Search vendor "Gnu" for product "Wget" and version "1.11.2" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.11.3 Search vendor "Gnu" for product "Wget" and version "1.11.3" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Wget Search vendor "Gnu" for product "Wget" | 1.11.4 Search vendor "Gnu" for product "Wget" and version "1.11.4" | - |
Affected
|