Local Information Disclosure in GNU Wget Affected By Metadata Leakage
CVE-2018-20483

7.8HIGH

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
26 December 2018

Summary

A flaw in GNU Wget allows local users to access sensitive information through the metadata attributes of downloaded files. Specifically, the 'user.xdg.origin.url' and 'user.xdg.referrer.url' attributes store sensitive data, including URL information that may contain credentials. Attackers can exploit this vulnerability by utilizing tools such as 'getfattr' to read this metadata, potentially leading to unauthorized access to confidential information.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.