HTTP: Wget HTTP Redirect Directory Traversal
This signature detects attempts to exploit a known vulnerability against GNU Wget. GNU Wget versions 1.9.1 and earlier are vulnerable. Attackers, sending an HTTP Redirect response by a malicious server, can use the client to execute arbitrary commands.
Extended Description
Multiple remote vulnerabilities reportedly affect GNU wget. These issues are due to the application's failure to properly sanitize user-supplied input and to properly validate the presence of files before writing to them. The issues include: - a potential directory-traversal issue - an arbitrary file-overwriting vulnerability - a weakness caused by the application's failure to filter potentially malicious characters from server-supplied input. Via a malicious server, an attacker may exploit these issues to arbitrarily overwrite files within the current directory and potentially outside of it. This may let the attacker corrupt files, cause a denial of service, and possibly launch further attacks against the affected computer. Overwriting of files would take place with the privileges of the user that activates the vulnerable application.
Affected Products
Conectiva linux
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Conectiva
Suse
Trustix
Gnu
Turbolinux
Ubuntu
5.0