First published: Tue Mar 07 2017(Updated: )
CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wget | <=1.19.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6508 is rated as medium severity due to its potential for allowing arbitrary HTTP header injection.
To fix CVE-2017-6508, update Wget to version 1.19.2 or later, which mitigates the vulnerability.
The potential impact of CVE-2017-6508 includes the possibility of remote attackers injecting malicious HTTP headers, which could lead to further exploitation.
CVE-2017-6508 affects Wget versions up to and including 1.19.1.
Yes, CVE-2017-6508 can be exploited over any network where the vulnerable version of Wget is used to process URLs from untrusted sources.