MGASA-2024-0378 - Updated wget packages fix security vulnerability

Publication date: 27 Nov 2024
URL: https://advisories.mageia.org/MGASA-2024-0378.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2024-10524

Applications that use Wget to access a remote resource using shorthand
URLs and pass arbitrary user credentials in the URL are vulnerable. In
these cases attackers can enter crafted credentials which will cause
Wget to access an arbitrary host. (CVE-2024-10524)

References:
- https://bugs.mageia.org/show_bug.cgi?id=33780
- https://www.openwall.com/lists/oss-security/2024/11/18/6
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10524

SRPMS:
- 9/core/wget-1.21.4-1.2.mga9

Mageia 2024-0378: wget Security Advisory Updates

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable

Summary

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host. (CVE-2024-10524)

References

- https://bugs.mageia.org/show_bug.cgi?id=33780

- https://www.openwall.com/lists/oss-security/2024/11/18/6

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10524

Resolution

MGASA-2024-0378 - Updated wget packages fix security vulnerability

SRPMS

- 9/core/wget-1.21.4-1.2.mga9

Severity
Publication date: 27 Nov 2024
URL: https://advisories.mageia.org/MGASA-2024-0378.html
Type: security
CVE: CVE-2024-10524

Related News