CWE
20
Advisory Published
CVE Published
Updated

CVE-2010-2253: Input Validation

First published: Mon May 17 2010(Updated: )

+++ This bug was initially created as a clone of <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2010-2251 lftp: multiple HTTP client download filename vulnerability [OCERT 2010-001]" href="show_bug.cgi?id=591580">Bug #591580</a> +++ The draft advisory from oCERT follows: The lftp, wget and lwp-download applications are ftp/http clients and file transfer tools supporting various network protocols. The lwp-download script is shipped along with the libwww-perl library. Unsafe behaviours have been found in lftp and lwp-download handling the Content-Disposition header in conjunction with the 'suggested filename' functionality. Additionally unsafe behaviours have been found in wget and lwp-download in case of HTTP 3xx redirections during file dowloading. The two applications automatically use the URL's filename portion specified in the Location header. Implicitly trusting the suggested filenames results in a saved file that differs from the expected one according to the URL specified by the user. This can be used by a malicious attacker to silently write hidden and/or initialization files under the user's current directory (e.g. .login, .bashrc). The impact of this vulnerability is increased in the case of lftp/lftpget as the default configuration allows file overwrite without prompting confirmation to the user. In case of lftp the get1 command is affected. This command can be invoked directly by the user from lftp's command line interface or indirectly by using the lftpget script, packaged within lftp distribution. Affected version: lftp &lt;= 4.0.5 wget &lt;= 1.12 libwww-perl &lt;= 5.834 Fixed version: lftp &gt;= 4.0.6 wget N/A libwww-perl &gt;= 5.835 Credit: Vulnerability discovered and reported by Hank Leininger and Solar Designer under the Openwall Project, with further analysis by Daniele Bianco of oCERT. MITRE has assigned the name <a href="https://access.redhat.com/security/cve/CVE-2010-2253">CVE-2010-2253</a> to this issue.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
libwww-perl=5.40_01
libwww-perl<=5.834
libwww-perl=5.828
libwww-perl=5.827
libwww-perl=5.826
libwww-perl=5.825
libwww-perl=5.811
libwww-perl=5.810
libwww-perl=5.808
libwww-perl=5.807
libwww-perl=5.74
libwww-perl=5.73
libwww-perl=5.72
libwww-perl=5.71
libwww-perl=5.53_92
libwww-perl=5.53_91
libwww-perl=5.53_90
libwww-perl=5.53
libwww-perl=5.52
libwww-perl=5.36
libwww-perl=5.35
libwww-perl=5.34
libwww-perl=5.33
libwww-perl=5.15
libwww-perl=5.14
libwww-perl=5.13
libwww-perl=5.12
libwww-perl=5b12
libwww-perl=5b11
libwww-perl=5b10
libwww-perl=5b9
libwww-perl=5.833
libwww-perl=5.820
libwww-perl=5.819
libwww-perl=5.818
libwww-perl=5.817
libwww-perl=5.802
libwww-perl=5.801
libwww-perl=5.800
libwww-perl=5.79
libwww-perl=5.65
libwww-perl=5.64
libwww-perl=5.63
libwww-perl=5.62
libwww-perl=5.53_97
libwww-perl=5.47
libwww-perl=5.46
libwww-perl=5.45
libwww-perl=5.44
libwww-perl=5.20
libwww-perl=5.19
libwww-perl=5.18_05
libwww-perl=5.18_04
libwww-perl=5.07
libwww-perl=5.06
libwww-perl=5.05
libwww-perl=5.04
libwww-perl=0.04
libwww-perl=0.03
libwww-perl=0.02
libwww-perl=0.01
libwww-perl=5.831
libwww-perl=5.829
libwww-perl=5.824
libwww-perl=5.822
libwww-perl=5.815
libwww-perl=5.813
libwww-perl=5.805
libwww-perl=5.803
libwww-perl=5.78
libwww-perl=5.76
libwww-perl=5.69
libwww-perl=5.67
libwww-perl=5.60
libwww-perl=5.53_96
libwww-perl=5.53_94
libwww-perl=5.51
libwww-perl=5.49
libwww-perl=5.42
libwww-perl=5.32
libwww-perl=5.30
libwww-perl=5.21
libwww-perl=5.18_03
libwww-perl=5.17
libwww-perl=5.10
libwww-perl=5.08
libwww-perl=5.03
libwww-perl=5.01
libwww-perl=5b13
libwww-perl=5b8
libwww-perl=5b6
libwww-perl=5.832
libwww-perl=5.830
libwww-perl=5.823
libwww-perl=5.821
libwww-perl=5.816
libwww-perl=5.814
libwww-perl=5.812
libwww-perl=5.806
libwww-perl=5.804
libwww-perl=5.77
libwww-perl=5.75
libwww-perl=5.70
libwww-perl=5.68
libwww-perl=5.66
libwww-perl=5.61
libwww-perl=5.53_95
libwww-perl=5.53_93
libwww-perl=5.50
libwww-perl=5.48
libwww-perl=5.43
libwww-perl=5.41
libwww-perl=5.31
libwww-perl=5.22
libwww-perl=5.18
libwww-perl=5.16
libwww-perl=5.11
libwww-perl=5.09
libwww-perl=5.02
libwww-perl=5.00
libwww-perl=5b7
libwww-perl=5b5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2010-2253?

    CVE-2010-2253 has a medium severity rating as it allows remote attackers to execute arbitrary commands through crafted input.

  • How do I fix CVE-2010-2253?

    To fix CVE-2010-2253, you should upgrade the affected version of libwww-perl to version 5.835 or later.

  • What software is affected by CVE-2010-2253?

    CVE-2010-2253 affects several versions of libwww-perl, notably versions from 5.40_01 up to 5.834.

  • What type of vulnerability is CVE-2010-2253?

    CVE-2010-2253 is categorized as a command injection vulnerability that can be exploited via HTTP client downloads.

  • Is there a workaround for CVE-2010-2253 if I cannot upgrade?

    A temporary workaround for CVE-2010-2253 includes restricting the usage of HTTP client functions that may expose the vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203