CRLF injection in wget - CVE-2017-6508
Published: October 30, 2017
Vulnerability identifier: #VU8989
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6508
CWE-ID: CWE-113
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: GNU
Affected software:
wget
wget
Detailed vulnerability description
The vulnerability allows a remote attacker to perform content spoofing attack.
The vulnerability exists due to an error in the url_parse() function in url.c in Wget through 1.19.1. A remote attacker can inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL and spoof contents of the targeted website.
The vulnerability exists due to an error in the url_parse() function in url.c in Wget through 1.19.1. A remote attacker can inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL and spoof contents of the targeted website.
How to mitigate CVE-2017-6508
Update to version 1.19.1.