Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

wget: CVE-2018-20483 #1566

Closed
l2dy opened this issue Jan 1, 2019 · 2 comments

Comments

Projects
None yet
2 participants
@l2dy
Copy link
Contributor

commented Jan 1, 2019

CVE IDs: CVE-2018-20483

Other security advisory IDs: N/A

Descriptions:
As you might have seen, the new release 1.20.1 of GNU Wget addresses
CVE-2018-20483.

The issue is that since 1.19 Wget stores the URL and in certain cases
the 'Referer' URL within extended attributes (xattrs) of the file system
- by default.

This includes username + password and other credentials or private data
if those have been used within the URLs. Anyone with read access to
those files might also read the xattrs and might use the data.

Wget 1.20.1 or higher will not use xattrs by default any more. To enable
it again you have to use the --xattr option or xattr command for .wgetrc
files.

Patches: N/A

PoC(s): https://lists.gnu.org/archive/html/bug-wget/2018-12/msg00034.html

Architectural progress:

  • AMD64 amd64
  • AArch64 arm64
  • ARMv7 armel
  • PowerPC 64-bit BE ppc64
  • PowerPC 32-bit BE powerpc

MingcongBai added a commit that referenced this issue Jan 15, 2019

@MingcongBai

This comment has been minimized.

Copy link
Member

commented Jan 25, 2019

Fixed with dc72928. Closing.

@l2dy

This comment has been minimized.

Copy link
Contributor Author

commented Jan 25, 2019

Use AOSA-2019-0011.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.