File Overwriting Vulnerability in GNU Wget by Free Software Foundation
CVE-2010-2252
Currently unrated
Summary
GNU Wget versions 1.12 and earlier are susceptible to a file overwriting vulnerability that arises when the software uses a server-provided filename from a 3xx redirect to determine the destination filename for downloads. This behavior can be exploited by remote attackers, enabling them to create or overwrite arbitrary files. An attacker could leverage this vulnerability through a specially crafted URL to redirect to a .wgetrc filename, potentially executing arbitrary code by modifying files in the user's home directory. It underscores the necessity for strict URL validation and user awareness when downloading files from untrusted sources.
References
Timeline
Vulnerability published
Vulnerability Reserved