8.1
CVSSv3

CVE-2016-7098

Published: 26/09/2016 Updated: 03/09/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Race condition in wget 1.17 and previous versions, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu wget

Vendor Advisories

Debian Bug report logs - #836503 wget: CVE-2016-7098: files rejected by access list are kept on the disk for the duration of HTTP connection Package: src:wget; Maintainer for src:wget is Noël Köthe <noel@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 3 Sep 2016 14:24:01 UTC Severity: ...
Several security issues were fixed in Wget ...
Several security issues were fixed in Wget ...
Race condition in wget 117 and earlier, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open ...

Exploits

''' ============================================= - Discovered by: Dawid Golunski - dawid[at]legalhackerscom - legalhackerscom - legalhackerscom/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098html - CVE-2016-7098 - Release date: 24112016 - Revision 10 - Severity: Medium ============================================= ...
GNU wget versions 117 and earlier, when used in mirroring/recursive mode, are affected by a race condition vulnerability that might allow remote attackers to bypass intended wget access list restrictions specified with the -A parameter This might allow attackers to place malicious/restricted files onto the system Depending on the application / d ...