-
-
Notifications
You must be signed in to change notification settings - Fork 6.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[security] Do not store username/password in extended attributes when enabling --xattr flag #3423
Labels
Comments
This is a security issue for wget because they didn't require a flag for this action like curl does. I agree we should strip off the credentials when storing the url but the security impact of the current behavior is not like the wget CVE. |
On 2 Jan 2019, at 10:14, Daniel Stenberg ***@***.***> wrote:
This is a security issue for wget because they didn't require a flag for this action like curl does. I agree we should strip off the credentials when storing the url but the security impact of the current behavior is not like the wget CVE.
Unless someone is interested in hacking on this now, I suggest that we add this to the TODO.
|
I had some time over on a flight yesterday so there's a PR coming from me for this... |
bagder
added a commit
that referenced
this issue
Jan 3, 2019
Both user and password are cleared uncondtitionally. Fixes #3423
bagder
added a commit
that referenced
this issue
Jan 5, 2019
Both user and password are cleared uncondtitionally. Fixes #3423
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
https://nvd.nist.gov/vuln/detail/CVE-2018-20483 contains the relevant information, can be reproduced by:
The text was updated successfully, but these errors were encountered: