Vulnerability Details : CVE-2018-0494
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
Vulnerability category: Input validation
Exploit prediction scoring system (EPSS) score for CVE-2018-0494
Probability of exploitation activity in the next 30 days: 9.64%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-0494
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2018-0494
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-0494
-
https://www.exploit-db.com/exploits/44601/
GNU wget - Cookie InjectionExploit;Third Party Advisory;VDB Entry
-
https://usn.ubuntu.com/3643-2/
USN-3643-2: Wget vulnerability | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3643-1/
USN-3643-1: Wget vulnerability | Ubuntu security noticesThird Party Advisory
-
https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html
[Bug-wget] [ANNOUNCEMENT] New release 1.19.5 of GNU WgetPatch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html
[SECURITY] [DLA 1375-1] wget security updateMailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1040838
wget Input Validation Flaw in SetCookie Processing Lets Remote Users Inject Arbitrary Cookies on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/104129
GNU wget CVE-2018-0494 Cookie Injection Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2018:3052
RHSA-2018:3052 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://savannah.gnu.org/bugs/?53763
GNU Wget - Bugs: Exiting with Error [Savannah]Broken Link
-
https://security.gentoo.org/glsa/201806-01
GNU Wget: Cookie injection (GLSA 201806-01) — Gentoo securityThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4195
Debian -- Security Information -- DSA-4195-1 wgetThird Party Advisory
-
https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt
Exploit;Third Party Advisory
-
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
wget.git - GNU WgetThird Party Advisory
Products affected by CVE-2018-0494
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*