6.8

CVE-2010-2252

GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.

Data is provided by the National Vulnerability Database (NVD)
GnuWget Version <= 1.12
GnuWget Version1.5.3
GnuWget Version1.6
GnuWget Version1.7
GnuWget Version1.7.1
GnuWget Version1.8
GnuWget Version1.8.1
GnuWget Version1.8.2
GnuWget Version1.9
GnuWget Version1.9.1
GnuWget Version1.10
GnuWget Version1.10.1
GnuWget Version1.10.2
GnuWget Version1.11
GnuWget Version1.11.1
GnuWget Version1.11.2
GnuWget Version1.11.3
GnuWget Version1.11.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.11% 0.881
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.