CVE-2010-2252

GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
VendorProductVersion
gnuwget
𝑥
≤ 1.12
gnuwget
1.5.3
gnuwget
1.6
gnuwget
1.7
gnuwget
1.7.1
gnuwget
1.8
gnuwget
1.8.1
gnuwget
1.8.2
gnuwget
1.9
gnuwget
1.9.1
gnuwget
1.10
gnuwget
1.10.1
gnuwget
1.10.2
gnuwget
1.11
gnuwget
1.11.1
gnuwget
1.11.2
gnuwget
1.11.3
gnuwget
1.11.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wget
bullseye
1.21-1+deb11u1
fixed
bookworm
1.21.3-1
fixed
sid
1.24.5-2
fixed
trixie
1.24.5-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
wget
lucid
Fixed 1.12-1.1ubuntu2.1
released
karmic
Fixed 1.11.4-2ubuntu2.1
released
jaunty
Fixed 1.11.4-2ubuntu1.2
released
hardy
Fixed 1.10.2-3ubuntu1.2
released
dapper
Fixed 1.10.2-1ubuntu1.2
released
References