CVE-2024-38428
Gnu
CVE-2024-38428: GNU Wget URI Handling Vulnerability. Discover a critical security flaw in GNU Wget versions through 1.24.5, where improper handling of semicolons in URIs can lead to misinterpretation of user information as part of the host. This vulnerability, tracked as CVE-2024-38428, allows attackers to potentially bypass security measures. With a CVSS score of 9.1 and an SVRS of 79, this issue requires immediate attention. The SVRS indicates a high level of real-world risk due to observed exploit attempts. The primary risk is that malicious actors can manipulate URIs to redirect users to unintended or harmful destinations, compromising system security. This vulnerability is significant due to the widespread use of Wget in various applications and systems.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.