CVE-2024-10524
November 19, 2024
It has been discovered that when using the HTTP shorthand format with user-provided input, unexpected behavior may occur. Wget might issue an FTP request to a different host – a potentially attacker-controlled host or a restricted host which the user normally does not have access to. This SSRF vulnerability can be the starting point for many types of attacks.
Affected Packages
https://git.savannah.gnu.org/git/wget.git (SCM_GIT):
Affected version(s) >=v1.13 <v1.25.0Fix Suggestion:
Update to version v1.25.0Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
LOW
Subsequent System Integrity
LOW
Subsequent System Availability
LOW
CVSS v3
Base Score:
6.5
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
EPSS
Base Score:
0.47