5
CVSSv2

CVE-2004-1488

Published: 27/04/2005 Updated: 03/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu wget 1.8.2

gnu wget 1.9

gnu wget 1.9.1

gnu wget 1.8

gnu wget 1.8.1

Vendor Advisories

Synopsis wget security update Type/Severity Security Advisory: Low Topic Updated wget package that fixes several security issues is now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description GNU Wget is a file retrieval utility t ...
Jan Minar discovered a path traversal vulnerability in wget If the name “” was a valid host name (which can be achieved with a malicious or poisoned domain name server), it was possible to trick wget into creating downloaded files into arbitrary locations with arbitrary names For example, wget could silently overwrite the users ~/bashrc an ...

Exploits

source: wwwsecurityfocuscom/bid/11871/info Multiple remote vulnerabilities reportedly affect GNU wget These issues are due to the application's failure to properly sanitize user-supplied input and to properly validate the presence of files before writing to them The issues include: - a potential directory-traversal issue - an arbitrary ...