Vulnerability Details : CVE-2024-38428
url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.
Products affected by CVE-2024-38428
- cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-38428
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-38428
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-10-28 |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
NIST | 2024-08-08 |
CWE ids for CVE-2024-38428
-
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2024-38428
-
https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html
-
https://security.netapp.com/advisory/ntap-20241115-0005/
-
https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html
Re: Semicolon not allowed in userinfoMailing List;Patch
-
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace
wget.git - GNU WgetMailing List;Patch
Jump to