{"id":34215,"date":"2024-06-18T08:26:57","date_gmt":"2024-06-18T06:26:57","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=34215"},"modified":"2025-06-07T15:32:47","modified_gmt":"2025-06-07T13:32:47","slug":"critical-vulnerability-cve-2024-38428-in-wget","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/06\/18\/critical-vulnerability-cve-2024-38428-in-wget\/","title":{"rendered":"Critical vulnerability CVE-2024-38428 in wget"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/06\/18\/kritische-schwachstelle-cve-2024-38428-in-wget-dringend-handeln\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]There is a critical vulnerability in the command line program wget, which has a CVSS Base Score of 10.0. CERT-Bund warns of the vulnerability, which is contained in wget versions &lt;=1.24.5. An attacker can carry out an unspecified attack. Anyone using wget under Linux or Windows should take urgent action and stop using the program. Because there is no updated version yet.<\/p>\n<p><!--more--><\/p>\n<h2>What is wget?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg09.met.vgwort.de\/na\/0434e62f52cc436abe8666513e2898e8\" alt=\"\" width=\"1\" height=\"1\" \/><a href=\"https:\/\/en.wikipedia.org\/wiki\/Wget\" target=\"_blank\" rel=\"noopener\">wget<\/a> is a free command line program from the GNU project for downloading files from the Internet. The supported protocols include ftp, http and https. The program is available for Unix, GNU\/Linux, OS\/2, Windows and SkyOS, among others. It is licensed under the GNU General Public License and can be downloaded from the <a href=\"https:\/\/www.gnu.org\/software\/wget\/\" target=\"_blank\" rel=\"noopener\">Wget page<\/a>.<\/p>\n<h2>Critical\u00a0wget\u00a0vulnerability CVE-2024-38428<\/h2>\n<p>German blog reader Bernie pointed out within the discussion area of my blog, that there is a <a href=\"https:\/\/wid.cert-bund.de\/portal\/wid\/securityadvisory?name=WID-SEC-2024-1386\" target=\"_blank\" rel=\"noopener\">warning from German CERT-Bund<\/a>, dated June 17, 2024, about wget (thanks for that). A vulnerability has been discovered that is rated as critical and has a CVSS base score of 10.0.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/i.postimg.cc\/GmSbNsJL\/image.png\" \/><\/p>\n<p>The vulnerability affects the open source versions of wget versions up to and including version 1.24.5 (which is the current version). The CERT-Bund only states that an anonymous remote attacker can exploit the vulnerability in wget to carry out an unspecified attack. This vulnerability warning is available <a href=\"https:\/\/github.com\/advisories\/GHSA-2j66-vp53-phjj\" target=\"_blank\" rel=\"noopener\">on GitHub<\/a>.<\/p>\n<h2>Details on the vulnerability CVE-2024-3842<\/h2>\n<p><a href=\"https:\/\/www.cvedetails.com\/cve\/CVE-2024-38428\/\" target=\"_blank\" rel=\"noopener\">CVE-2024-38428<\/a> reports that the url.c module in GNU Wget up to 1.24.5 incorrectly handles semicolons in the userinfo subcomponent of a URI. This can lead to unsafe behavior where data that should be in the userinfo subcomponent is incorrectly interpreted as part of the host subcomponent. Tim R\u00fcbsen discusses the details of this bug discovered since June 2, 2024 on the gnu.org list in the post <a href=\"https:\/\/lists.gnu.org\/archive\/html\/bug-wget\/2024-06\/msg00005.html\" target=\"_blank\" rel=\"noopener\">Re: Semicolon not allowed in userinfo<\/a>.<\/p>\n<p>Manipulated URLs could reveal authentication details and sensitive information. There is also a risk of manipulation. Norddeutsch summarized it like this in a comment: The linked discussions git here, esp. gnu.org address concrete possible abuse:<\/p>\n<ul>\n<li>Auth Details: exposure of sensitive information<\/li>\n<li>Host Header Manipulation: phishing, MitM redirect<\/li>\n<li>Data leakage. unintended exposure of credentials<\/li>\n<\/ul>\n<p>As far as I have seen quickly, there is not yet a wget update that fixes this vulnerability. You should therefore refrain from using the command line command at the moment. German blog reader Nordeutsch estimates that the Linux distributions will be ready with a fixed version in a few days.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]There is a critical vulnerability in the command line program wget, which has a CVSS Base Score of 10.0. CERT-Bund warns of the vulnerability, which is contained in wget versions &lt;=1.24.5. An attacker can carry out an unspecified attack. Anyone &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/06\/18\/critical-vulnerability-cve-2024-38428-in-wget\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1319],"tags":[],"class_list":["post-34215","post","type-post","status-publish","format-standard","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=34215"}],"version-history":[{"count":2,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34215\/revisions"}],"predecessor-version":[{"id":38312,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34215\/revisions\/38312"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=34215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=34215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=34215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}