ArchLinux: 201410-14: wget: arbitrary filesystem access
Summary
It was found that wget was susceptible to a symlink attack which could
create arbitrary files, directories or symbolic links and set their
permissions when retrieving a directory recursively through FTP.
By default, when retrieving ftp directories recursively and a symbolic
link is encountered, the symbolic link is traversed and the pointed-to
files are retrieved. This option poses a security risk where a malicious
FTP Server may cause Wget to write to files outside of the intended
directories through a specially crafted .listing file.
Resolution
Upgrade to 1.16-2.
# pacman -Syu "wget>=1.16-2"
The problem has been fixed upstream in version 1.16.
References
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4877 https://bugzilla.redhat.com/show_bug.cgi?id=1139181 https://seclists.org/oss-sec/2014/q4/453
Workaround
Do not use the --retr-symlinks=yes option when recursively retrieving a directory from an untrusted FTP server or over an untrusted connection.