ID CVE-2004-1488
Summary wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
References
Vulnerable Configurations
  • GNU wget 1.8
    cpe:2.3:a:gnu:wget:1.8
  • GNU wget 1.8.1
    cpe:2.3:a:gnu:wget:1.8.1
  • GNU wget 1.8.2
    cpe:2.3:a:gnu:wget:1.8.2
  • GNU wget 1.9
    cpe:2.3:a:gnu:wget:1.9
  • GNU wget 1.9.1
    cpe:2.3:a:gnu:wget:1.9.1
CVSS
Base: 5.0 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
exploit-db via4
description GNU WGet 1.x Multiple Remote Vulnerabilities. CVE-2004-1488. Remote exploit for linux platform
id EDB-ID:24813
last seen 2016-02-03
modified 2004-12-10
published 2004-12-10
reporter Jan Minar
source https://www.exploit-db.com/download/24813/
title gnu wget 1.x - Multiple Vulnerabilities
nessus via4
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2005-771.NASL
    description Updated wget package that fixes several security issues is now available. This update has been rated as having low security impact by the Red Hat Security Response Team. GNU Wget is a file retrieval utility that can use either the HTTP or FTP protocols. A bug was found in the way wget writes files to the local disk. If a malicious local user has write access to the directory wget is saving a file into, it is possible to overwrite files that the user running wget has write access to. (CVE-2004-2014) A bug was found in the way wget filters redirection URLs. It is possible for a malicious Web server to overwrite files the user running wget has write access to. Note: in order for this attack to succeed the local DNS would need to resolve '..' to an IP address, which is an unlikely situation. (CVE-2004-1487) A bug was found in the way wget displays HTTP response codes. It is possible that a malicious web server could inject a specially crafted terminal escape sequence capable of misleading the user running wget. (CVE-2004-1488) Users should upgrade to this updated package, which contains a version of wget that is not vulnerable to these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 21857
    published 2006-07-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21857
    title CentOS 3 / 4 : wget (CESA-2005:771)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-145-1.NASL
    description Jan Minar discovered a path traversal vulnerability in wget. If the name '..' was a valid host name (which can be achieved with a malicious or poisoned domain name server), it was possible to trick wget into creating downloaded files into arbitrary locations with arbitrary names. For example, wget could silently overwrite the users ~/.bashrc and other configuration files which are executed automatically. (CAN-2004-1487) Jan Minar also discovered that wget printed HTTP response strings from the server to the terminal without any filtering. Malicious HTTP servers could exploit this to send arbitrary terminal sequences and strings which would then be executed and printed to the console. This could potentially lead to arbitrary code execution with the privileges of the user invoking wget. (CAN-2004-1488) Hugo Vazquez Carames discovered a race condition when writing output files. After wget determined the output file name, but before the file was actually opened (the time window is determined by the delay of the first received data packet), a local attacker with with write permission to the download directory could create a symbolic link with the name of the output file. This could be exploited to overwrite arbitrary files with the permissions of the user invoking wget. (CAN-2004-2014). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 20538
    published 2006-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20538
    title Ubuntu 4.10 / 5.04 : wget vulnerabilities (USN-145-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_06F142FF4DF311D9A9E70001020EED82.NASL
    description Jan Minar reports that there exists multiple vulnerabilities in wget : Wget erroneously thinks that the current directory is a fair game, and will happily write in any file in and below it. Malicious HTTP response or malicious HTML file can redirect wget to a file that is vital to the system, and wget will create/append/overwrite it. Wget apparently has at least two methods of ``sanitizing'' the potentially malicious data it receives from the HTTP stream, therefore a malicious redirects can pass the check. We haven't find a way to trick wget into writing above the parent directory, which doesn't mean it's not possible. Malicious HTTP response can overwrite parts of the terminal so that the user will not notice anything wrong, or will believe the error was not fatal.
    last seen 2019-02-21
    modified 2018-12-19
    plugin id 18831
    published 2005-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18831
    title FreeBSD : wget -- multiple vulnerabilities (06f142ff-4df3-11d9-a9e7-0001020eed82)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_WGET-1689.NASL
    description This update fixes a security in wget, where evil servers could send terminal escape codes to the user calling wget. This would only affect interactive sessions. (CVE-2004-1488) Additionaly a previous '.file' fix was found to be buggy and replaced. This bug could lead to '.directories' not being retrievable and '_files' being overwritten.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27476
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27476
    title openSUSE 10 Security Update : wget (wget-1689)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-771.NASL
    description Updated wget package that fixes several security issues is now available. This update has been rated as having low security impact by the Red Hat Security Response Team. GNU Wget is a file retrieval utility that can use either the HTTP or FTP protocols. A bug was found in the way wget writes files to the local disk. If a malicious local user has write access to the directory wget is saving a file into, it is possible to overwrite files that the user running wget has write access to. (CVE-2004-2014) A bug was found in the way wget filters redirection URLs. It is possible for a malicious Web server to overwrite files the user running wget has write access to. Note: in order for this attack to succeed the local DNS would need to resolve '..' to an IP address, which is an unlikely situation. (CVE-2004-1487) A bug was found in the way wget displays HTTP response codes. It is possible that a malicious web server could inject a specially crafted terminal escape sequence capable of misleading the user running wget. (CVE-2004-1488) Users should upgrade to this updated package, which contains a version of wget that is not vulnerable to these issues.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 19833
    published 2005-10-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19833
    title RHEL 2.1 / 3 / 4 : wget (RHSA-2005:771)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-098.NASL
    description Two vulnerabilities were found in wget. The first is that an HTTP redirect statement could be used to do a directory traversal and write to files outside of the current directory. The second is that HTTP redirect statements could be used to overwrite dot ('.') files, potentially overwriting the user's configuration files (such as .bashrc, etc.). The updated packages have been patched to help address these problems by replacing dangerous directories and filenames containing the dot ('.') character with an underscore ('_') character.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 18440
    published 2005-06-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18440
    title Mandrake Linux Security Advisory : wget (MDKSA-2005:098)
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_11090.NASL
    description This update fixes a security bug in wget, where evil servers could send terminal escape codes to the user calling wget. This would only affect interactive sessions. (CVE-2004-1488) Additionally a previous '.file' fix was found to be buggy and replaced. This bug could lead to '.directories' not being retrievable and '_files' being overwritten.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 41093
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41093
    title SuSE9 Security Update : wget (YOU Patch Number 11090)
oval via4
accepted 2013-04-29T04:21:51.364-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
family unix
id oval:org.mitre.oval:def:9750
status accepted
submitted 2010-07-09T03:56:16-04:00
title wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
version 23
redhat via4
advisories
rhsa
id RHSA-2005:771
refmap via4
bid 11871
bugtraq 20041209 wget: Arbitrary file overwriting/appending/creating and other vulnerabilities
misc http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755
sectrack 1012472
secunia 20960
suse SUSE-SR:2006:016
ubuntu USN-145-1
xf wget-terminal-overwrite(18421)
Last major update 17-10-2016 - 22:55
Published 27-04-2005 - 00:00
Last modified 03-10-2018 - 17:29
Back to Top