CVE-2010-2252

EUVD-2010-2264
GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
Affected Products (NVD)
VendorProductVersion
gnuwget
𝑥
≤ 1.12
gnuwget
1.5.3
gnuwget
1.6
gnuwget
1.7
gnuwget
1.7.1
gnuwget
1.8
gnuwget
1.8.1
gnuwget
1.8.2
gnuwget
1.9
gnuwget
1.9.1
gnuwget
1.10
gnuwget
1.10.1
gnuwget
1.10.2
gnuwget
1.11
gnuwget
1.11.1
gnuwget
1.11.2
gnuwget
1.11.3
gnuwget
1.11.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wget
bookworm
1.21.3-1
fixed
bullseye
1.21-1+deb11u1
fixed
sid
1.24.5-2
fixed
trixie
1.24.5-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
wget
dapper
Fixed 1.10.2-1ubuntu1.2
released
hardy
Fixed 1.10.2-3ubuntu1.2
released
jaunty
Fixed 1.11.4-2ubuntu1.2
released
karmic
Fixed 1.11.4-2ubuntu2.1
released
lucid
Fixed 1.12-1.1ubuntu2.1
released
References