CVE-2024-10524

Source
https://cve.org/CVERecord?id=CVE-2024-10524
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-10524.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-10524
Aliases
Downstream
Related
Published
2024-11-19T15:15:06.740Z
Modified
2026-01-14T18:59:02.382698Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.

References

Affected packages

Git / cgit.git.savannah.gnu.org/cgit/wget.git

Affected ranges

Type
GIT
Repo
https://cgit.git.savannah.gnu.org/cgit/wget.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
c419542d956a2607bbce5df64b9d378a8588d778

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-10524.json"