CVE-2018-0494
high-risk
Published 2018-05-06
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
Do I need to act?
!
64.2% chance of exploitation in next 30 days
EPSS score — higher than 36% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (12)
References (26)
Third Party Advisory
http://www.securityfocus.com/bid/104129
Third Party Advisory
http://www.securitytracker.com/id/1040838
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3052
Third Party Advisory
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76d...
Broken Link
https://savannah.gnu.org/bugs/?53763
Third Party Advisory
https://security.gentoo.org/glsa/201806-01
Third Party Advisory
https://usn.ubuntu.com/3643-1/
Third Party Advisory
https://usn.ubuntu.com/3643-2/
Third Party Advisory
https://www.debian.org/security/2018/dsa-4195
Third Party Advisory
http://www.securityfocus.com/bid/104129
Third Party Advisory
http://www.securitytracker.com/id/1040838
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3052
Third Party Advisory
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76d...
Broken Link
https://savannah.gnu.org/bugs/?53763
and 6 more references
60
/ 100
high-risk
Severity
24/34 · High
Exploitability
19/34 · Moderate
Exposure
17/34 · Moderate