First published: Wed May 09 2018(Updated: )
It was discovered that Wget incorrectly handled certain inputs. An attacker could possibly use this to inject arbitrary cookie values.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/wget | <1.19.4-1ubuntu2.1 | 1.19.4-1ubuntu2.1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/wget | <1.19.1-3ubuntu1.2 | 1.19.1-3ubuntu1.2 |
Ubuntu Ubuntu | =17.10 | |
All of | ||
ubuntu/wget | <1.17.1-1ubuntu1.4 | 1.17.1-1ubuntu1.4 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/wget | <1.15-1ubuntu1.14.04.4 | 1.15-1ubuntu1.14.04.4 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Wget vulnerability is CVE-2018-0494.
The severity of CVE-2018-0494 is moderate.
This Wget vulnerability allows an attacker to inject arbitrary cookie values.
The affected versions of Wget are 1.19.4-1ubuntu2.1, 1.19.1-3ubuntu1.2, 1.17.1-1ubuntu1.4, and 1.15-1ubuntu1.14.04.4.
To fix this Wget vulnerability, update to version 1.19.4-1ubuntu2.1 or later.