CVE-2016-7098
GNU Wget < 1.18 - Access List Bypass / Race Condition
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Race condition in wget 1.17 and earlier, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.
Condición de carrera en wget1.17 y versiones anteriores, cuando es utilizado en modo recursivo o de reflejo para descargar un único archivo, podría permitir a servidores remotos eludir las restricciones de lista destinadas al acceso manteniendo una conexión HTTP abierta.
GNU wget versions 1.17 and earlier, when used in mirroring/recursive mode, are affected by a race condition vulnerability that might allow remote attackers to bypass intended wget access list restrictions specified with the -A parameter. This might allow attackers to place malicious/restricted files onto the system. Depending on the application / download directory, this could potentially lead to other vulnerabilities such as code execution, etc.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-08-26 CVE Reserved
- 2016-09-26 CVE Published
- 2024-07-19 EPSS Updated
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00134.html | Mailing List | |
http://www.openwall.com/lists/oss-security/2016/08/27/2 | Mailing List | |
http://www.securityfocus.com/bid/93157 | Vdb Entry | |
https://lists.debian.org/debian-lts-announce/2020/01/msg00031.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/40824 | 2024-08-06 | |
http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00083.html | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2016-09/msg00044.html | 2017-09-03 | |
http://lists.opensuse.org/opensuse-updates/2017-01/msg00007.html | 2017-09-03 |