// For flags

CVE-2010-2252

wget: multiple HTTP client download filename vulnerability [OCERT 2010-001]

Severity Score

8.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.

GNU Wget v1.12 y anteriores usan un nombre de fichero proporcionado por el servidor en lugar de la URL original para determinar el nombre de fichero destino de una descarga, lo que permite a servidores remotos crear o sobreescribir ficheros de su elección a través de redirecciones 3xx en una URL con nombre de fichero .wgetrc seguido por la redirección 3xx en una URL con un nombre de fichero manipulado, y probablemente ejecutar código de su elección como consecuencia de escribir un fichero punto en un directorio home.

The wget package provides the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. Wget provides various useful features, such as the ability to work in the background while the user is logged out, recursive retrieval of directories, file name wildcard matching or updating files in dependency on file timestamp comparison. It was discovered that wget used a file name provided by the server when saving a downloaded file. This could cause wget to create a file with a different name than expected, possibly allowing the server to execute arbitrary code on the client.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-06-09 CVE Reserved
  • 2010-07-06 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
<= 1.12
Search vendor "Gnu" for product "Wget" and version " <= 1.12"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.5.3
Search vendor "Gnu" for product "Wget" and version "1.5.3"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.6
Search vendor "Gnu" for product "Wget" and version "1.6"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.7
Search vendor "Gnu" for product "Wget" and version "1.7"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.7.1
Search vendor "Gnu" for product "Wget" and version "1.7.1"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.8
Search vendor "Gnu" for product "Wget" and version "1.8"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.8.1
Search vendor "Gnu" for product "Wget" and version "1.8.1"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.8.2
Search vendor "Gnu" for product "Wget" and version "1.8.2"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.9
Search vendor "Gnu" for product "Wget" and version "1.9"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.9.1
Search vendor "Gnu" for product "Wget" and version "1.9.1"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.10
Search vendor "Gnu" for product "Wget" and version "1.10"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.10.1
Search vendor "Gnu" for product "Wget" and version "1.10.1"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.10.2
Search vendor "Gnu" for product "Wget" and version "1.10.2"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.11
Search vendor "Gnu" for product "Wget" and version "1.11"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.11.1
Search vendor "Gnu" for product "Wget" and version "1.11.1"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.11.2
Search vendor "Gnu" for product "Wget" and version "1.11.2"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.11.3
Search vendor "Gnu" for product "Wget" and version "1.11.3"
-
Affected
Gnu
Search vendor "Gnu"
Wget
Search vendor "Gnu" for product "Wget"
1.11.4
Search vendor "Gnu" for product "Wget" and version "1.11.4"
-
Affected