First published: Tue Feb 15 2005(Updated: )
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wget | =1.8 | |
Wget | =1.8.1 | |
Wget | =1.8.2 | |
Wget | =1.9 | |
Wget | =1.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1487 allows remote attackers to overwrite files on the local system, potentially leading to data loss or system compromise.
To fix CVE-2004-1487, upgrade to a newer version of wget that does not contain this vulnerability.
CVE-2004-1487 affects wget versions 1.8.x and 1.9.x, including specific versions like 1.8.1, 1.8.2, and 1.9.1.
The vulnerability in CVE-2004-1487 arises from the lack of proper filtering for ".." sequences in URLs by wget.
While CVE-2004-1487 is serious, its risk level may vary based on the specific system configuration and use cases of wget.