First published: Mon Sep 08 2014(Updated: )
Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/wget | <1.16 | 1.16 |
Wget | <=1.15 | |
Wget | =1.12 | |
Wget | =1.13 | |
Wget | =1.13.1 | |
Wget | =1.13.2 | |
Wget | =1.13.3 | |
Wget | =1.13.4 | |
Wget | =1.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4877 has a severity rating that indicates a high risk due to potential arbitrary file writing and code execution.
To fix CVE-2014-4877, upgrade GNU Wget to version 1.16 or later.
CVE-2014-4877 affects GNU Wget versions prior to 1.16, specifically versions 1.15 and lower.
CVE-2014-4877 is classified as an absolute path traversal vulnerability leading to potential code execution.
Yes, CVE-2014-4877 can be exploited remotely via malicious FTP servers using specially crafted LIST responses.