[3.9] wget: Information exposure in set_file_metadata function in xattr.c (CVE-2018-20483)
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file’s
origin URL in the user.xdg.origin.url metadata attribute of the extended
attributes of the
downloaded file, which allows local users to obtain sensitive
information (e.g., credentials contained in the URL) by reading this
attribute, as demonstrated by getfattr.
This also applies to Referer information in the user.xdg.referrer.url
metadata attribute. According to 2016-07-22 in the Wget ChangeLog,
user.xdg.origin.url was
partially based on the behavior of fwrite_xattr in tool_xattr.c in
curl.
Fixed In Version:
wget 1.20.1
References:
http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
https://nvd.nist.gov/vuln/detail/CVE-2018-20483
Patches:
Introduced by:
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=a933bdd31eee9c956a3b5cc142f004ef1fa94cb3
(v1.19)
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=c125d24762962d91050d925fbbd9e6f30b2302f8
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=3cdfb594cf75f11cdbb9702ac5e856c332ccacfa
(from redmine: issue id 9817, created on 2019-01-01, closed on 2019-01-09)
- Relations:
- parent #9816 (closed)
- Changesets:
- Revision e6404a21 on 2019-01-03T07:51:58Z:
main/wget: security upgrade to 1.20.1 (CVE-2018-20483)
Fixes #9817