Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

wget: CVE-2018-20483 #1566

l2dy opened this issue Jan 1, 2019 · 2 comments


None yet
2 participants
Copy link

commented Jan 1, 2019

CVE IDs: CVE-2018-20483

Other security advisory IDs: N/A

As you might have seen, the new release 1.20.1 of GNU Wget addresses

The issue is that since 1.19 Wget stores the URL and in certain cases
the 'Referer' URL within extended attributes (xattrs) of the file system
- by default.

This includes username + password and other credentials or private data
if those have been used within the URLs. Anyone with read access to
those files might also read the xattrs and might use the data.

Wget 1.20.1 or higher will not use xattrs by default any more. To enable
it again you have to use the --xattr option or xattr command for .wgetrc

Patches: N/A


Architectural progress:

  • AMD64 amd64
  • AArch64 arm64
  • ARMv7 armel
  • PowerPC 64-bit BE ppc64
  • PowerPC 32-bit BE powerpc

MingcongBai added a commit that referenced this issue Jan 15, 2019


This comment has been minimized.

Copy link

commented Jan 25, 2019

Fixed with dc72928. Closing.


This comment has been minimized.

Copy link
Contributor Author

commented Jan 25, 2019

Use AOSA-2019-0011.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.