4.3
CVSSv2

CVE-2017-6508

Published: 07/03/2017 Updated: 01/07/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

CRLF injection vulnerability in the url_parse function in url.c in Wget up to and including 1.19.1 allows remote malicious users to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu wget

Vendor Advisories

Debian Bug report logs - #857073 wget: CVE-2017-6508: CRLF injection in the url_parse function in urlc Package: src:wget; Maintainer for src:wget is Noël Köthe <noel@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 7 Mar 2017 19:57:01 UTC Severity: important Tags: patch, security, ups ...
Debian Bug report logs - #879957 wget CVE-2017-13089/CVE-2017-13090 Package: wget; Maintainer for wget is Noël Köthe <noel@debianorg>; Source for wget is src:wget (PTS, buildd, popcon) Reported by: Henri Salo <henri@nervfi> Date: Fri, 27 Oct 2017 16:42:02 UTC Severity: serious Tags: fixed-upstream, security, ups ...
Several security issues were fixed in Wget ...
Several security issues were fixed in Wget ...
CRLF injection in the url_parse function in urlcA CRLF injection flaw was found in the way wget handled URLs A remote attacker could use this flaw to inject arbitrary HTTP headers in requests, via CRLF sequences in the host sub-component of a URL, by tricking a user running wget into processing crafted URLs (CVE-2017-6508) ...
A CRLF injection flaw was found in the way wget handled URLs A remote attacker could use this flaw to inject arbitrary HTTP headers in requests, via CRLF sequences in the host sub-component of a URL, by tricking a user running wget into processing crafted URLs ...
A CRLF injection flaw was found in the way wget < 1192 handled URLs A remote attacker could use this flaw to inject arbitrary HTTP headers in requests, via CRLF sequences in the host sub-component of a URL, by tricking a user running wget into processing crafted URLs ...