First published: Sun Jun 16 2024(Updated: )
GNU Wget could allow a remote authenticated attacker to bypass security restrictions, caused by the mishandling of semicolons in the userinfo subcomponent of a URI. By sending a specially crafted request, an attacker could exploit this vulnerability to perform unauthorized actions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wget | <=1.21-1+deb11u1<=1.21.3-1 | 1.24.5-2 |
GNU Wget | <=1.24.5 | |
redhat/wget 1.24.5 | <10 | 10 |
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38428 is classified as a moderate severity vulnerability due to its potential to allow unauthorized actions.
To fix CVE-2024-38428, upgrade to a patched version of Wget, specifically 1.24.5-2 or higher for Debian and 10 or higher for Red Hat.
CVE-2024-38428 affects GNU Wget versions up to and including 1.24.5 on various platforms, including Debian and Red Hat.
Yes, CVE-2024-38428 can be exploited by remote authenticated attackers through specially crafted requests.
If exploited, CVE-2024-38428 may allow attackers to bypass security restrictions and perform unauthorized actions.