wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
Link | Tags |
---|---|
http://www.redhat.com/support/errata/RHSA-2005-771.html | vendor advisory |
http://www.securityfocus.com/bid/11871 | exploit vdb entry vendor advisory |
http://marc.info/?l=bugtraq&m=110269474112384&w=2 | mailing list |
https://usn.ubuntu.com/145-1/ | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18420 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11682 | vdb entry signature |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755 | exploit vendor advisory |
http://securitytracker.com/id?1012472 | vdb entry |