Project

General

Profile

Bug #9818

Bug #9816: wget: Information exposure in set_file_metadata function in xattr.c (CVE-2018-20483)

[3.8] wget: Information exposure in set_file_metadata function in xattr.c (CVE-2018-20483)

Added by Alicha CH 6 months ago. Updated 6 months ago.

Status:
Closed
Priority:
Normal
Category:
Security
Target version:
Start date:
01/01/2019
Due date:
% Done:

100%

Estimated time:
Affected versions:
Security IDs:
CVE-2018-20483

Description

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the
downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr.
This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was
partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

Fixed In Version:

wget 1.20.1

References:

http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
https://nvd.nist.gov/vuln/detail/CVE-2018-20483

Patches:

Introduced by: https://git.savannah.gnu.org/cgit/wget.git/commit/?id=a933bdd31eee9c956a3b5cc142f004ef1fa94cb3 (v1.19)
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=c125d24762962d91050d925fbbd9e6f30b2302f8
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=3cdfb594cf75f11cdbb9702ac5e856c332ccacfa

History

#1 Updated by Leonardo Arena 6 months ago

  • Status changed from New to Resolved

Fixed with commit 1eabf36322e007ecbef28fe8ab5e63e005e82418

#2 Updated by Alicha CH 6 months ago

  • Project changed from Alpine Security to Alpine Linux
  • Category set to Security
  • Status changed from Resolved to Closed

#3 Updated by Alicha CH 6 months ago

  • % Done changed from 0 to 100

Also available in: Atom PDF