vendor:
Wget
by:
Dawid Golunski
8,1
CVSS
HIGH
Access List Bypass / Race Condition
362
CWE
Product Name: Wget
Affected Version From: 1.17
Affected Version To: 1.18
Patch Exists: YES
Related CWE: CVE-2016-7098
CPE: a:gnu:wget
Metasploit:
https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-7098/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-7098/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2016-7098/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2016-7098/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2016-7098/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2016-7098/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-7098/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-7098/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: All
2016
GNU Wget < 1.18 Access List Bypass / Race Condition
When wget is used in recursive/mirroring mode, according to the manual it can take the following access list options: 'Recursive Accept/Reject Options: -A acclist --accept acclist -R rejlist --reject rejlist'. It was however discovered that when a single file is requested with wget, the access list restrictions are not properly enforced. This can be exploited by an attacker to place malicious files onto the target system, even if the -A or -R parameters are used. The vulnerability is caused by a race condition between the time when wget checks the access list and the time when the file is actually created.
Mitigation:
Ensure that the latest version of wget is installed and running on the system.