File Overwriting Vulnerability in GNU Wget by Free Software Foundation
CVE-2010-2252

Currently unrated

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
6 July 2010

Summary

GNU Wget versions 1.12 and earlier are susceptible to a file overwriting vulnerability that arises when the software uses a server-provided filename from a 3xx redirect to determine the destination filename for downloads. This behavior can be exploited by remote attackers, enabling them to create or overwrite arbitrary files. An attacker could leverage this vulnerability through a specially crafted URL to redirect to a .wgetrc filename, potentially executing arbitrary code by modifying files in the user's home directory. It underscores the necessity for strict URL validation and user awareness when downloading files from untrusted sources.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.