5
CVSSv2

CVE-2004-1487

Published: 27/04/2005 Updated: 03/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu wget 1.8

gnu wget 1.8.1

gnu wget 1.8.2

gnu wget 1.9

gnu wget 1.9.1

Vendor Advisories

Synopsis wget security update Type/Severity Security Advisory: Low Topic Updated wget package that fixes several security issues is now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description GNU Wget is a file retrieval utility t ...
Jan Minar discovered a path traversal vulnerability in wget If the name “” was a valid host name (which can be achieved with a malicious or poisoned domain name server), it was possible to trick wget into creating downloaded files into arbitrary locations with arbitrary names For example, wget could silently overwrite the users ~/bashrc an ...