First published: Wed Jun 26 2024(Updated: )
It was discovered that Wget incorrectly handled semicolons in the userinfo subcomponent of a URI. A remote attacker could possibly trick a user into connecting to a different host than expected.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/wget | <1.21.4-1ubuntu4.1 | 1.21.4-1ubuntu4.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/wget | <1.21.3-1ubuntu1.1 | 1.21.3-1ubuntu1.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/wget | <1.21.2-2ubuntu1.1 | 1.21.2-2ubuntu1.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/wget | <1.20.3-1ubuntu2.1 | 1.20.3-1ubuntu2.1 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6852-1 is considered to be critical due to its potential for remote exploitation.
To fix USN-6852-1, update Wget to version 1.21.4-1ubuntu4.1 or later on affected Ubuntu systems.
Versions of Wget prior to 1.21.4-1ubuntu4.1 on Ubuntu 24.04, 23.10, 22.04, and 20.04 are affected by USN-6852-1.
A remote attacker could exploit USN-6852-1 to trick a user into connecting to a malicious host by manipulating URIs.
USN-6852-1 was initially discovered due to Wget's improper handling of semicolons in the userinfo subcomponent of URIs.