MGASA-2024-0378

Source
https://advisories.mageia.org/MGASA-2024-0378.html
Import Source
https://advisories.mageia.org/MGASA-2024-0378.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0378
Related
Published
2024-11-27T19:59:10Z
Modified
2024-11-27T19:29:11Z
Summary
Updated wget packages fix security vulnerability
Details

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host. (CVE-2024-10524)

References
Credits

Affected packages

Mageia:9 / wget

Package

Name
wget
Purl
pkg:rpm/mageia/wget?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21.4-1.2.mga9

Ecosystem specific

{
    "section": "core"
}