Lucene search

K
archlinuxArch LinuxASA-201606-19
HistoryJun 20, 2016 - 12:00 a.m.

wget: arbitrary file overwrite

2016-06-2000:00:00
Arch Linux
lists.archlinux.org
19

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.958 High

EPSS

Percentile

99.3%

GNU Wget when supplied with a malicious website link can be tricked
into saving an arbitrary remote file supplied by an attacker, with
arbitrary content and filename under the current directory. This can
lead to potential code execution by creating system scripts (such as
.bash_profile and others) within home directory as well as other
unauthorized actions (such as request sniffing by proxy modification,
or arbitrary system file retrieval) by uploading .wgetrc configuration
file.
Because of this vulnerability, an attacker is able to overwrite an
arbitrary file in the victim’s current directory.

OSVersionArchitecturePackageVersionFilename
anyanyanywget< 1.18-1UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.958 High

EPSS

Percentile

99.3%