GNU.Wget.HTTP.Redirect.Arbitrary.File.Overwrite
Description
This indicates an attack attempt against an Arbitrary File Overwrite vulnerability in Wget.
The vulnerability is caused by an error when the vulnerable software trusts the filename provided by an FTP server, but the original request is redirected from an HTTP server. It allows a remote attacker to overwrite arbitrary file or execute arbitrary code on vulnerable systems.
Affected Products
GNU wget prior to 1.18
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Upgrade to the latest version, available from the web site.
http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-11-05 | 16.957 | Name:GNU. wget. HTTP. Redirect. Arbitrary. File. Overwrite:GNU. Wget. HTTP. Redirect. Arbitrary. File. Overwrite |