vendor:
Wget
by:
liewehacksie
8.8
CVSS
HIGH
Arbitrary File Upload / Remote Code Execution
434
CWE
Product Name: Wget
Affected Version From: GNU Wget < 1.18
Affected Version To: GNU Wget < 1.18
Patch Exists: YES
Related CWE: CVE-2016-4971
CPE: a:gnu:wget
Metasploit:
https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-4971/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-6df56c60-3738-11e6-a671-60a44ce6887b/
Other Scripts:
N/A
Platforms Tested: None
2016
GNU Wget < 1.18 - Arbitrary File Upload / Remote Code Execution (2)
This exploit takes advantage of the GNU Wget < 1.18 vulnerability to upload a file to the FTP server and execute it remotely. The exploit works by creating a HTTP server and sending a 301 redirect to the FTP server with the file to be uploaded. The FTP server then uploads the file to the /home/ directory.
Mitigation:
Upgrade to the latest version of GNU Wget.