CVE-2014-4877: wget: FTP symlink arbitrary filesystem access

Related Vulnerabilities: CVE-2014-4877  

Debian Bug report logs - #766981
CVE-2014-4877: wget: FTP symlink arbitrary filesystem access

version graph

Package: wget; Maintainer for wget is Noël Köthe <noel@debian.org>; Source for wget is src:wget (PTS, buildd, popcon).

Reported by: Henri Salo <henri@nerv.fi>

Date: Mon, 27 Oct 2014 11:45:07 UTC

Severity: important

Tags: confirmed, fixed-upstream, security, upstream

Found in versions wget/1.15-1, wget/1.12-1

Fixed in versions wget/1.16-1, wget/1.13.4-3+deb7u2

Done: Noël Köthe <noel@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Noël Köthe <noel@debian.org>:
Bug#766981; Package wget. (Mon, 27 Oct 2014 11:45:12 GMT) (full text, mbox, link).


Acknowledgement sent to Henri Salo <henri@nerv.fi>:
New Bug report received and forwarded. Copy sent to Noël Köthe <noel@debian.org>. (Mon, 27 Oct 2014 11:45:12 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Henri Salo <henri@nerv.fi>
To: submit@bugs.debian.org
Subject: CVE-2014-4877: wget: FTP symlink arbitrary filesystem access
Date: Mon, 27 Oct 2014 13:35:41 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Package: wget
Version: 1.15-1
Severity: important
Tags: fixed-upstream, security, upstream

http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7

"""
Wget was susceptible to a symlink attack which could create arbitrary files,
directories or symbolic links and set their permissions when retrieving a
directory recursively through FTP. This commit changes the default settings in
Wget such that Wget no longer creates local symbolic links, but rather traverses
them and retrieves the pointed-to file in such a retrieval. The old behaviour
can be attained by passing the --retr-symlinks=no option to the Wget invokation
command.
"""

- ---
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlROLg0ACgkQXf6hBi6kbk//KgCfY1kB9+jp++XGb1GMlekuBirP
IbEAoMBHvnAupKh7npnyUcyxyzk9R6R6
=uiOZ
-----END PGP SIGNATURE-----



Marked as fixed in versions wget/1.16-1. Request was from Noël Köthe <noel@debian.org> to control@bugs.debian.org. (Mon, 27 Oct 2014 12:15:04 GMT) (full text, mbox, link).


Added tag(s) confirmed. Request was from Noël Köthe <noel@debian.org> to control@bugs.debian.org. (Mon, 27 Oct 2014 12:15:05 GMT) (full text, mbox, link).


Reply sent to Noël Köthe <noel@debian.org>:
You have taken responsibility. (Mon, 27 Oct 2014 12:15:10 GMT) (full text, mbox, link).


Notification sent to Henri Salo <henri@nerv.fi>:
Bug acknowledged by developer. (Mon, 27 Oct 2014 12:15:10 GMT) (full text, mbox, link).


Message #14 received at 766981-done@bugs.debian.org (full text, mbox, reply):

From: Noël Köthe <noel@debian.org>
To: Henri Salo <henri@nerv.fi>, 766981-done@bugs.debian.org
Cc: control <control@bugs.debian.org>
Subject: Re: Bug#766981: CVE-2014-4877: wget: FTP symlink arbitrary filesystem access
Date: Mon, 27 Oct 2014 13:11:51 +0100
[Message part 1 (text/plain, inline)]
fixed 766981 1.16-1
tags 766981 + confirmed
thanks

Am Montag, den 27.10.2014, 13:35 +0200 schrieb Henri Salo:

> http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7
> 
> """
> Wget was susceptible to a symlink attack which could create arbitrary files,
> directories or symbolic links and set their permissions when retrieving a
> directory recursively through FTP. This commit changes the default settings in
> Wget such that Wget no longer creates local symbolic links, but rather traverses
> them and retrieves the pointed-to file in such a retrieval. The old behaviour
> can be attained by passing the --retr-symlinks=no option to the Wget invokation
> command.
> """

This is fixed in the today released version of wget 1.16 which is
already uploaded to unstable:

https://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html

https://packages.qa.debian.org/w/wget/news/20141027T104935Z.html

It will be in the archive in the next hours.

Regards

	Noël
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Noël Köthe <noel@debian.org>:
Bug#766981; Package wget. (Mon, 27 Oct 2014 12:39:33 GMT) (full text, mbox, link).


Acknowledgement sent to Henri Salo <henri@nerv.fi>:
Extra info received and forwarded to list. Copy sent to Noël Köthe <noel@debian.org>. (Mon, 27 Oct 2014 12:39:33 GMT) (full text, mbox, link).


Message #19 received at 766981@bugs.debian.org (full text, mbox, reply):

From: Henri Salo <henri@nerv.fi>
To: 766981@bugs.debian.org
Subject: 766981
Date: Mon, 27 Oct 2014 14:30:17 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ok. Nice and thanks!

- ---
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlROOtkACgkQXf6hBi6kbk+dTwCfSMi51fRJ8AVXXL3tXG3OYKG+
FZgAmwQQna4Jd4nbP9HnjqFHQVQF7CE/
=bBRW
-----END PGP SIGNATURE-----



Marked as found in versions wget/1.12-1. Request was from Henrique de Moraes Holschuh <hmh@debian.org> to control@bugs.debian.org. (Thu, 30 Oct 2014 22:21:05 GMT) (full text, mbox, link).


Marked as fixed in versions wget/1.13.4-3+deb7u2. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 02 Nov 2014 21:27:09 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 01 Dec 2014 08:13:19 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:01:48 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.