First published: Wed Dec 11 2002(Updated: )
Directory traversal vulnerability in wget before 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wget | 1.20.1-1.1 1.21-1+deb11u1 1.21.3-1 1.21.4-1 | |
Wget | =1.8.2 | |
Wget | =1.7 | |
Sun Cobalt RaQ | ||
Wget | =1.6 | |
Wget | =1.8 | |
Wget | =1.8.1 | |
Wget | =1.7.1 | |
Wget | =1.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1344 is considered a moderate severity vulnerability due to its potential for file creation or overwriting on the affected systems.
To fix CVE-2002-1344, upgrade wget to a version that is not vulnerable, specifically versions after 1.8.2-4.
CVE-2002-1344 affects users of GNU Wget versions prior to 1.8.2-4 and certain systems using vulnerable configurations.
In the context of CVE-2002-1344, a directory traversal vulnerability allows an attacker to manipulate file paths to access or modify files outside of the intended directories.
Yes, CVE-2002-1344 can be exploited remotely by a malicious FTP server that instructs wget to download and overwrite files.