First published: Mon Sep 08 2014(Updated: )
Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Wget | <=1.15 | |
GNU Wget | =1.12 | |
GNU Wget | =1.13 | |
GNU Wget | =1.13.1 | |
GNU Wget | =1.13.2 | |
GNU Wget | =1.13.3 | |
GNU Wget | =1.13.4 | |
GNU Wget | =1.14 | |
redhat/wget | <1.16 | 1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.