Vulnerabilities > CVE-2014-4877 - Path Traversal vulnerability in GNU Wget

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
gnu
CWE-22
critical
nessus
metasploit

Summary

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Relative Path Traversal
    An attacker exploits a weakness in input validation on the target by supplying a specially constructed path utilizing dot and slash characters for the purpose of obtaining access to arbitrary files or resources. An attacker modifies a known path on the target in order to reach material that is not available through intended channels. These attacks normally involve adding additional path separators (/ or \) and/or dots (.), or encodings thereof, in various combinations in order to reach parent directories or entirely separate trees of the target's directory structure.
  • Directory Traversal
    An attacker with access to file system resources, either directly or via application logic, will use various file path specification or navigation mechanisms such as ".." in path strings and absolute paths to extend their range of access to inappropriate areas of the file system. The attacker attempts to either explore the file system for recon purposes or access directories and files that are intended to be restricted from their access. Exploring the file system can be achieved through constructing paths presented to directory listing programs, such as "ls" and 'dir', or through specially crafted programs that attempt to explore the file system. The attacker engaging in this type of activity is searching for information that can be used later in a more exploitive attack. Access to restricted directories or files can be achieved through modification of path references utilized by system applications.
  • File System Function Injection, Content Based
    An attack of this type exploits the host's trust in executing remote content including binary files. The files are poisoned with a malicious payload (targeting the file systems accessible by the target software) by the attacker and may be passed through standard channels such as via email, and standard web content like PDF and multimedia files. The attacker exploits known vulnerabilities or handling routines in the target processes. Vulnerabilities of this type have been found in a wide variety of commercial applications from Microsoft Office to Adobe Acrobat and Apple Safari web browser. When the attacker knows the standard handling routines and can identify vulnerabilities and entry points they can be exploited by otherwise seemingly normal content. Once the attack is executed, the attackers' program can access relative directories such as C:\Program Files or other standard system directories to launch further attacks. In a worst case scenario, these programs are combined with other propagation logic and work as a virus.
  • Using Slashes and URL Encoding Combined to Bypass Validation Logic
    This attack targets the encoding of the URL combined with the encoding of the slash characters. An attacker can take advantage of the multiple way of encoding an URL and abuse the interpretation of the URL. An URL may contain special character that need special syntax handling in order to be interpreted. Special characters are represented using a percentage character followed by two digits representing the octet code of the original character (%HEX-CODE). For instance US-ASCII space character would be represented with %20. This is often referred as escaped ending or percent-encoding. Since the server decodes the URL from the requests, it may restrict the access to some URL paths by validating and filtering out the URL requests it received. An attacker will try to craft an URL with a sequence of special characters which once interpreted by the server will be equivalent to a forbidden URL. It can be difficult to protect against this attack since the URL can contain other format of encoding such as UTF-8 encoding, Unicode-encoding, etc.
  • Manipulating Input to File System Calls
    An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible.

Metasploit

descriptionThis module exploits a vulnerability in Wget when used in recursive (-r) mode with a FTP server as a destination. A symlink is used to allow arbitrary writes to the target's filesystem. To specify content for the file, use the "file:/path" syntax for the TARGET_DATA option. Tested successfully with wget 1.14. Versions prior to 1.16 are presumed vulnerable.
idMSF:AUXILIARY/SERVER/WGET_SYMLINK_FILE_WRITE
last seen2020-06-01
modified2020-05-12
published2014-10-28
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/server/wget_symlink_file_write.rb
titleGNU Wget FTP Symlink Arbitrary Filesystem Access

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2015-121.NASL
    descriptionUpdated wget package fixes security vulnerability : Wget was susceptible to a symlink attack which could create arbitrary files, directories or symbolic links and set their permissions when retrieving a directory recursively through FTP (CVE-2014-4877). The default settings in wget have been changed such that wget no longer creates local symbolic links, but rather traverses them and retrieves the pointed-to file in such a retrieval. The old behaviour can be attained by passing the --retr-symlinks=no option to the wget command.
    last seen2020-06-01
    modified2020-06-02
    plugin id82374
    published2015-03-30
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82374
    titleMandriva Linux Security Advisory : wget (MDVSA-2015:121)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-82.NASL
    descriptionHD Moore of Rapid7 discovered a symlink attack in Wget, a command-line utility to retrieve files via HTTP, HTTPS, and FTP. The vulnerability allows to create arbitrary files on the user
    last seen2020-03-17
    modified2015-03-26
    plugin id82227
    published2015-03-26
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82227
    titleDebian DLA-82-1 : wget security update
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-15385.NASL
    description - add fix for arches with unsigned char - security update - Fix the progress bar issue (#1159643) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-11-24
    plugin id79398
    published2014-11-24
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79398
    titleFedora 20 : wget-1.16-3.fc20 (2014-15385)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3062.NASL
    descriptionHD Moore of Rapid7 discovered a symlink attack in Wget, a command-line utility to retrieve files via HTTP, HTTPS, and FTP. The vulnerability allows to create arbitrary files on the user
    last seen2020-03-17
    modified2014-11-04
    plugin id78833
    published2014-11-04
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78833
    titleDebian DSA-3062-1 : wget - security update
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2014-637.NASL
    descriptionwget was updated to version 1.16 to fix one security issue. The following security issue was fixed : - Fix for symlink attack which could allow a malicious ftp server to create arbitrary files, directories or symbolic links and set their permissions when retrieving a directory recursively through FTP (CVE-2014-4877).
    last seen2020-06-05
    modified2014-11-11
    plugin id79103
    published2014-11-11
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79103
    titleopenSUSE Security Update : wget (openSUSE-SU-2014:1380-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2014-1764.NASL
    descriptionAn updated wget package that fixes one security issue is now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The wget package provides the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode (using the
    last seen2020-06-01
    modified2020-06-02
    plugin id78751
    published2014-10-31
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78751
    titleCentOS 6 / 7 : wget (CESA-2014:1764)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2014-1464-1.NASL
    descriptionwget was updated to fix one security issue. This security issue was fixed : - FTP symlink arbitrary filesystem access (CVE-2014-4877). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-20
    plugin id83645
    published2015-05-20
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83645
    titleSUSE SLED12 / SLES12 Security Update : wget (SUSE-SU-2014:1464-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-15405.NASL
    descriptionadd fix for arches with unsigned char security update Fix the progress bar issue (#1159643) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-12-02
    plugin id79648
    published2014-12-02
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79648
    titleFedora 19 : wget-1.16-3.fc19 (2014-15405)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2014-442.NASL
    descriptionAbsolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    last seen2020-06-01
    modified2020-06-02
    plugin id78875
    published2014-11-06
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/78875
    titleAmazon Linux AMI : wget (ALAS-2014-442)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2014-1764.NASL
    descriptionFrom Red Hat Security Advisory 2014:1764 : An updated wget package that fixes one security issue is now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The wget package provides the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode (using the
    last seen2020-06-01
    modified2020-06-02
    plugin id78753
    published2014-10-31
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78753
    titleOracle Linux 6 / 7 : wget (ELSA-2014-1764)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1955.NASL
    descriptionAn updated wget package that fixes one security issue is now available for Red Hat Enterprise Linux 6.5 Extended Update Support. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The wget package provides the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode (using the
    last seen2020-06-01
    modified2020-06-02
    plugin id79710
    published2014-12-04
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79710
    titleRHEL 6 : wget (RHSA-2014:1955)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201411-05.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201411-05 (GNU Wget: Arbitrary code execution) An absolute path traversal vulnerability has been found in GNU Wget. Impact : A remote FTP server is able to write to arbitrary files, and consequently execute arbitrary code. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id79266
    published2014-11-17
    reporterThis script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79266
    titleGLSA-201411-05 : GNU Wget: Arbitrary code execution
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2393-1.NASL
    descriptionHD Moore discovered that Wget contained a path traversal vulnerability when downloading symlinks using FTP. A malicious remote FTP server or a man in the middle could use this issue to cause Wget to overwrite arbitrary files, possibly leading to arbitrary code execution. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id78763
    published2014-10-31
    reporterUbuntu Security Notice (C) 2014-2019 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78763
    titleUbuntu 10.04 LTS / 12.04 LTS / 14.04 LTS / 14.10 : wget vulnerability (USN-2393-1)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1417.NASL
    descriptionAccording to the versions of the wget package installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - A stack-based buffer overflow when processing chunked, encoded HTTP responses was found in wget. By tricking an unsuspecting user into connecting to a malicious HTTP server, an attacker could exploit this flaw to potentially execute arbitrary code.(CVE-2017-13089) - A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode (using the
    last seen2020-06-01
    modified2020-06-02
    plugin id124920
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124920
    titleEulerOS Virtualization 3.0.1.0 : wget (EulerOS-SA-2019-1417)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2014-0036.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - Fix CVE-2014-4877 wget: FTP symlink arbitrary filesystem access (#1156133) - Fix the parsing of weblink when doing recursive retrieving (#960137) - Fix errors found by static analysis of source code (#873216) - Add SNI (Server Name Indication) support (#909604) - Add --trust-server-names option to fix CVE-2010-2252 (#1062190) - Fix wget to recognize certificates with alternative names (#736445)
    last seen2020-06-01
    modified2020-06-02
    plugin id79551
    published2014-11-26
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79551
    titleOracleVM 3.3 : wget (OVMSA-2014-0036)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_EE7B4F9D66C811E49AE1E8E0B722A85E.NASL
    descriptionMITRE reports : Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    last seen2020-06-01
    modified2020-06-02
    plugin id79079
    published2014-11-10
    reporterThis script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79079
    titleFreeBSD : wget -- path traversal vulnerability in recursive FTP mode (ee7b4f9d-66c8-11e4-9ae1-e8e0b722a85e)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-15347.NASL
    descriptionadd fix for arches with unsigned char security update Fix the progress bar issue (#1159643) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-12-07
    plugin id79771
    published2014-12-07
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79771
    titleFedora 21 : wget-1.16-3.fc21 (2014-15347)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_WGET-141105.NASL
    descriptionwget has been updated to fix one security issue and two non-security issues. This security issue has been fixed : - FTP symlink arbitrary filesystem access (CVE-2014-4877). These non-security issues have been fixed : - Fix displaying of download time. (bnc#901276) - Fix 0 size FTP downloads after failure. (bnc#885069)
    last seen2020-06-05
    modified2014-11-06
    plugin id78887
    published2014-11-06
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/78887
    titleSuSE 11.3 Security Update : wget (SAT Patch Number 9933)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20141030_WGET_ON_SL6_X.NASL
    descriptionA flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode (using the
    last seen2020-03-18
    modified2014-11-04
    plugin id78854
    published2014-11-04
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78854
    titleScientific Linux Security Update : wget on SL6.x, SL7.x i386/x86_64 (20141030)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1764.NASL
    descriptionAn updated wget package that fixes one security issue is now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The wget package provides the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode (using the
    last seen2020-06-01
    modified2020-06-02
    plugin id78758
    published2014-10-31
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78758
    titleRHEL 6 / 7 : wget (RHSA-2014:1764)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2014-212.NASL
    descriptionUpdated wget package fixes security vulnerability : Wget was susceptible to a symlink attack which could create arbitrary files, directories or symbolic links and set their permissions when retrieving a directory recursively through FTP (CVE-2014-4877). The default settings in wget have been changed such that wget no longer creates local symbolic links, but rather traverses them and retrieves the pointed-to file in such a retrieval. The old behaviour can be attained by passing the --retr-symlinks=no option to the wget command.
    last seen2020-06-01
    modified2020-06-02
    plugin id78732
    published2014-10-30
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78732
    titleMandriva Linux Security Advisory : wget (MDVSA-2014:212)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2014-302-01.NASL
    descriptionNew wget packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id78724
    published2014-10-30
    reporterThis script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/78724
    titleSlackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : wget (SSA:2014-302-01)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2014-1366-2.NASL
    descriptionwget was updated to fix one security issue and two non-security issues : - FTP symbolic link arbitrary filesystem access (CVE-2014-4877). - Fix displaying of download time (bnc#901276). - Fix 0 size FTP downloads after failure (bnc#885069). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-27
    plugin id83845
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83845
    titleSUSE SLES11 Security Update : wget (SUSE-SU-2014:1366-2)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2014-1408-1.NASL
    descriptionwget was updated to fix one security issue : - FTP symbolic link arbitrary filesystem access (CVE-2014-4877). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-20
    plugin id83642
    published2015-05-20
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83642
    titleSUSE SLES10 Security Update : wget (SUSE-SU-2014:1408-1)

Redhat

advisories
  • bugzilla
    id1139181
    titleCVE-2014-4877 wget: FTP symlink arbitrary filesystem access
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • commentwget is earlier than 0:1.12-5.el6_6.1
        ovaloval:com.redhat.rhsa:tst:20141764001
      • commentwget is signed with Red Hat redhatrelease2 key
        ovaloval:com.redhat.rhsa:tst:20140151002
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • commentwget is earlier than 0:1.14-10.el7_0.1
        ovaloval:com.redhat.rhsa:tst:20141764004
      • commentwget is signed with Red Hat redhatrelease2 key
        ovaloval:com.redhat.rhsa:tst:20140151002
    rhsa
    idRHSA-2014:1764
    released2014-10-30
    severityModerate
    titleRHSA-2014:1764: wget security update (Moderate)
  • rhsa
    idRHSA-2014:1955
rpms
  • wget-0:1.12-5.el6_6.1
  • wget-0:1.14-10.el7_0.1
  • wget-debuginfo-0:1.12-5.el6_6.1
  • wget-debuginfo-0:1.14-10.el7_0.1
  • wget-0:1.12-1.12.el6_5
  • wget-debuginfo-0:1.12-1.12.el6_5

The Hacker News

idTHN:820DE66F934DB5A87AC06D38B142255D
last seen2018-01-27
modified2014-10-30
published2014-10-29
reporterSwati Khandelwal
sourcehttps://thehackernews.com/2014/10/cve-2014-4877-wget-ftp-symlink-attack.html
titleCVE-2014-4877: Wget FTP Symlink Attack Vulnerability