6.8
CVSSv2

CVE-2010-2252

Published: 06/07/2010 Updated: 28/11/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

GNU Wget 1.12 and previous versions uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu wget 1.8.2

gnu wget 1.8.1

gnu wget 1.11.3

gnu wget 1.11.2

gnu wget 1.8

gnu wget 1.7.1

gnu wget 1.11.1

gnu wget 1.11

gnu wget 1.9

gnu wget 1.5.3

gnu wget 1.11.4

gnu wget 1.9.1

gnu wget

gnu wget 1.7

gnu wget 1.6

gnu wget 1.10.2

gnu wget 1.10.1

gnu wget 1.10

Vendor Advisories

Debian Bug report logs - #590296 wget: CVE-2010-2252 use of server provided file name might lead to overwriting arbitrary files Package: wget; Maintainer for wget is Noël Köthe <noel@debianorg>; Source for wget is src:wget (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Sun, 25 Jul 2010 17:06 ...
It was discovered that Wget would use filenames provided by the server when following 3xx redirects If a user or automated system were tricked into downloading a file from a malicious site, a remote attacker could create the file with an arbitrary name (eg wgetrc), and possibly run arbitrary code ...
It was discovered that wget, a command line tool for downloading files from the WWW, uses server-provided file names when creating local files This may lead to code execution in some scenarios After this update, wget will ignore server-provided file names You can restore the old behavior in cases where it is not desirable by invoking wget with t ...