WGet Critical Vulnerability- CVE-2024-38428

WGet Critical Vulnerability- CVE-2024-38428


Security researchers identify a critical vulnerability in the command line program wget, which is contained in wget versions <=1.24.5. An attacker can carry out an unspecified attack.

The vulnerability tracked as CVE-2024-38428, with a CVSS score of 10, affects the open source versions of wget versions up to and including version 1.24.5. The CERT-Bund only states that an anonymous remote attacker can exploit the vulnerability in wget to carry out an unspecified attack.

Advertisements

The vulnerability resides in the url.c module in GNU Wget up to 1.24.5 incorrectly handles semicolons in the userinfo subcomponent of a URI. This can lead to unsafe behavior where data that should be in the userinfo subcomponent is incorrectly interpreted as part of the host subcomponent

Manipulated URLs could reveal authentication details and sensitive information. There is also a risk of manipulation.

  • Auth Details: exposure of sensitive information
  • Host Header Manipulation: phishing, MitM redirect
  • Data leakage. unintended exposure of credentials

There is not yet a wget update that fixes this vulnerability. At this moment, refrain from using the command line command at the moment until the patch is released.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.