HTTP: Wget HTTP Redirect Directory Traversal

This signature detects attempts to exploit a known vulnerability against GNU Wget. GNU Wget versions 1.9.1 and earlier are vulnerable. Attackers, sending an HTTP Redirect response by a malicious server, can use the client to execute arbitrary commands.

Extended Description

Multiple remote vulnerabilities reportedly affect GNU wget. These issues are due to the application's failure to properly sanitize user-supplied input and to properly validate the presence of files before writing to them. The issues include: - a potential directory-traversal issue - an arbitrary file-overwriting vulnerability - a weakness caused by the application's failure to filter potentially malicious characters from server-supplied input. Via a malicious server, an attacker may exploit these issues to arbitrarily overwrite files within the current directory and potentially outside of it. This may let the attacker corrupt files, cause a denial of service, and possibly launch further attacks against the affected computer. Overwriting of files would take place with the privileges of the user that activates the vulnerable application.

Affected Products

Conectiva linux

Short Name
HTTP:STC:WGET-REDIRECT
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2004-1487 Directory HTTP Redirect Traversal Wget bid:11871
Release Date
08/10/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Conectiva

Suse

Trustix

Gnu

Turbolinux

Ubuntu

CVSS Score

5.0

Found a potential security threat?