We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-10524

GNU Wget is vulnerable to an SSRF attack when accessing partially-user-controlled shorthand URLs



Description

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

Reserved 2024-10-30 | Published 2024-11-19 | Updated 2024-11-19 | Assigner JFROG


MEDIUM: 6.5CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unaffected

Any version before 1.25.0
affected

References

seclists.org/oss-sec/2024/q4/107 vendor-advisory

jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/ third-party-advisory

git.savannah.gnu.org/...542d956a2607bbce5df64b9d378a8588d778 patch

cve.org (CVE-2024-10524)

nvd.nist.gov (CVE-2024-10524)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-10524

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.