Computer Security
[EN] securityvulns.ru no-pyccku


wget unsafe files creation
Published:16.10.2011
Source:
SecurityVulns ID:11976
Type:local
Threat Level:
4/10
Description:Local file is created with server controlled filename.
Affected:GNU : wget 1.12
CVE:CVE-2010-2252 (GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod