Vulnerability Details : CVE-2004-1487
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
Products affected by CVE-2004-1487
- cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1487
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1487
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2004-1487
-
http://securitytracker.com/id?1012472
Access Denied
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11682
404 Not Found
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755
#261755 - wget: Server responses &c written to the tty verbatim (escape sequences, control characters, ...) - Debian Bug report logsExploit;Vendor Advisory
-
https://usn.ubuntu.com/145-1/
404: Page not found | Ubuntu
-
http://marc.info/?l=bugtraq&m=110269474112384&w=2
'wget: Arbitrary file overwriting/appending/creating and other vulnerabilities' - MARC
-
http://www.securityfocus.com/bid/11871
Exploit;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-771.html
Support
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/18420
wget to create modify and overwrite files undefined Vulnerability Report
Jump to