Thursday, October 30, 2014
3:45 AM
| Posted by
Unknown
|
CVE-2014-4877: Wget FTP Symlink Attack Vulnerability The open-source Wget application which is most widely used on Linux and Unix systems for retrieving files from the web has found vulnerable to a critical fla. GNU Wget is a command-line utility designed to retrieve files from the Web using HTTP, HTTPS, and FTP, the most widely used Internet protocols. Wget can be easily installed on any Unix-like system and has been ported to many environments, including Microsoft Windows, Mac OS X, OpenVMS, MorphOS and AmigaO. When a recursive directory fetch over FTP server as the target, it would let an attacker "create arbitrary files, directories or symbolic links" due to a symlink flaw. IMPACT OF SYMLINK ATTACK "It was found that wget was susceptible to a symlink attack which could create arbitrary files, directories or symbolic links and set their permissions when retrieving a directory recursively through FTP," developer Vasyl Kaigorodov wrote in a Red Hat Bugzilla commen. A remote unauthenticated malicious FTP server connected to the victim via wget would allow attackers to do anything they wanted. Wget could download and create or overwrite existing files within the context of the user running wge. The vulnerability was first reported to the GNU Wget project by HD Moore, chief research officer at Rapid7. and is publicly identified as CVE-2014-4877. The flaw is considered critical since wget is present on nearly every Linux server in the world, and is installable (although not by default) on OS X machines as well, so needs a patch as soon as possibl. PATCH AVAILABLE"This flaw can lead to remote code execution through system-level vectors such as cron and user-level vectors such as bash profile files and SSH authorized_keys," Moore wrot. The vulnerability has now been fixed by the Wget project in wget 1.16, which blocks the default setting that allowed the setting of local symlink. Upgrade to wget version 1.16 or a package that has backported the CVE-2014-4877 patch," Moore sai. WORKAROUND AVAILABLE EXPLOIT "This issue can be mitigated by ensuring that all invocations of wget in the mirror mode also specify --retr-symlinks command line option," wrote Tomas Hoger on the Bugzilla report. "Doing so is equivalent to applying the upstream commit linked in comment 14, which changes the default for the retr-symlinks options from off/no to on/yes, preventing creation of symbolic links locall. "In addition to changing arguments in all scripts or programs that invoke wget, it is possible to enabled[sic] retr-symlinks option via wget configuration file - either global /etc/wgetrc, or user specific ~/.wgetrc - by adding the line: retr-symlinks=on" An exploit for the vulnerability is now available on the open-source Metasploit penetration testing Website, so that security researchers could test the bug. You can download the exploit from here. source: #thehackernews
Subscribe to:
Post Comments
(Atom)
Welcome to my Blog!
Bine ati venit pe blogul nostru.
Cand nu sunt pe blog calatorim!!!
When I'm not blogging, I'm traveling :-)
Email me atGuran
Search
Blogroll
© 2014 by Guran Cosmin.
You're welcome to link to this site or use a single image and brief description to link back to any post. Republishing posts in their entirety is prohibited without permission.
Pictures
Become a Fan
Find Us On Facebook
Contact Form
Video
720x90 AdSpace
Recent Videos
Movie
http://youtu.be/Yj0G5UdBJZw
guran. Powered by Blogger.
Wikipedia
Search results
Popular Posts
-
Tare !!!(guta mititel ) continuare
-
#unuro The Google Black Holes Code: inurl:"view.asp?page=" intext:"plymouth" >>Ok what this code does? So thi...
-
You can press these buttons on your keyboard to use Facebook faster. j , k — Scroll between News Feed stories p — Post a new status l — Li...
-
//// What is DNS ///// Did you know you could be connected to facebook.com – and see facebook.com in your web browser’s address bar – whil...
-
10 Free Keyloggers to monitor your Local PC or Laptop! Here is an exclusive list of top 10 free local keyloggers. However If you are plannin...
-
Your blog is your personal online diary which combines the text, images and other media, and links to other blogs, web p...
-
What is Role Of Cookie,types, uses, setting and Privacy Concerns About Cookies What is Role Of Cookie,types, uses, setting and Privacy Conce...
-
(5) KING OF HACKERS How to Lock Drive of Remote Windows 10/8/7 Victim PC https://www.youtube.com/watch?v=4CgNDXKXxVo Facebook fan page : htt...
-
What is a VPN and how does it work? A VPN or Virtual Private Network is a method used to add security and privacy to private and public ne...
-
(5) For Indians! Happy Diwali in Batch Style! :P ;)... - Legendary Hacking Learners For Indians! Happy Diwali in Batch Style! @echo off colo...
Followers
Contributors
Archive
-
▼
2014
(1156)
-
▼
October
(494)
- https://www.youtube.com/watch?v=hKROVKDIuDo فەرموو...
- (84) Facebook11 Useful Cloud Computing Tutorials h...
- (29) Pure Hacking - @@@ FIND USERNAMES + PASSWORDS...
- Encryption Server Ngerat Klein # compiler skips Pr...
- (99) FacebookCold Cream + Cornstarch + Food Colori...
- (225) FacebookDIY Fake Blood DIY Face Paint DIY Va...
- (167) FacebookWhat is a penetration test? What is ...
- (61) Facebook7 Places That Beginner Hackers Will F...
- (137) Facebook10 HTML5, CSS3 Tricks That Web Geeks...
- (131) Facebookhey guys! I'm back with a brand new ...
- (122) Facebook50 Open Source Software For Your Win...
- (2) wikiHow - wikiHow added a new photo.Happy Hall...
- (12) Google as A Hacking Tool Global search engine...
- (46) FacebookKali Tools List with Short Descriptio...
- (39) FacebookGoogle as A Hacking Tool Global searc...
- (17) new magic code @*[223317557774374:] remove * ...
- (12) Guys recently we explained what is Penetratio...
- (142) Facebook200+ Videos That Will Make You A Mas...
- (100) Facebookساب paypal.. حساب بنكى 206 دولار Ema...
- (176) FacebookTop free PC programs everyone should...
- (179) FacebookDay 31. Last minute DIY Halloween Co...
- (15) Nokia Mobiles Secret Codes :... - Cybercells ...
- (127) Facebook10 Powerful SQL Injection Tools That...
- Interesting facts about browsers - YouTubePublishe...
- (135) Facebook50 Free System And Network Admin Too...
- Cracking WPA & WPA2 key with Aircrack-ng on Kali L...
- (50) FacebookCracking WPA & WPA2 key with Aircrack...
- (237) FacebookGo Here And Copy All the Codes >>>ht...
- (144) FacebookHOW TO IDENTIFY FAKE FACEBOOK ACCOUN...
- (108) Facebook8 Of The Best Free Proxy Websites Fo...
- (111) FacebookHere Are Top 20 Hacking Forums! http...
- (106) FacebookFirst on GAE Club Exclusive Android ...
- (128) FacebookYes, Google Can Be Used For Hacking ...
- (115) Facebook"Would you like some cheese with tha...
- Say Hello To The World
- Blog To Build Relations
- What is a Blog?
- Facebook Tricks
- Incredible Google
- programming
- (116) Facebook@@@ AVOID FRIEND REQUEST BLOCK ...!!...
- Halloween inspiration
- (3) wikiHow - wikiHow added a new photo.wikiHow In...
- (56) FacebookHow To Write Your #Name In Stylish...
- (321) FacebookAnonymous DDOS Tool! https://filetea...
- (145) FacebookHacking BSNL Broadband Internet spee...
- (116) FacebookProxy Clé Orange ^^ Telecom ^^ Tunis...
- (207) Facebook((((Bl@cK $H@rK H@cK3r))))))))))) Fi...
- (195) FacebookLo g India Ki Security Camers ki Sit...
- (127) FacebookLo g India Ki Security Camers ki Sit...
- Cr4x3r b1k4$h What is aobbfile and how do I open...
- (227) FacebookHow to Create Blog Templates Without...
- (208) FacebookLo g India Ki Security Camers ki Sit...
- (113) FacebookCVE-2014-4877: Wget FTP Symlink Atta...
- (101) FacebookHow To bypass sms verification on we...
- What is Role Of Cookie,types, uses, setting and Pr...
- (197) Facebookhttp://www.helpever.net/adminLogin.p...
- (3) #11 [Share một số con SHELL thông dụng ]... - ...
- (99) Make Some Useful & Dangerous Viruses In... - ...
- (120) FacebookTop 10 Android Apps That Turn Your P...
- (5) Five steps to make stay hidden on the internet...
- (33) >>>> TOP WORLD Hackers <<<< You can actually....
- (31) >>>> TOP WORLD Hackers <<<< You can actually....
- (5) TOP WORLD hackers#Admin >>Cookie Stealing At...
- Disadvantages of JavaScript - YouTubePublished on ...
- ███████▓█████▓▓╬╬╬╬╬╬╬╬▓███▓╬╬╬╬╬╬╬▓╬╬▓█ ████▓▓▓▓╬...
- (100) fb trìçkß grœup bÿ Âbhîñàv#Admin_post How ...
- (3) Heyy guyzz.. Now Im telling u tht How to Bypas...
- IT INFO: Cookie Stealing Attack:Hack Any Account l...
- AndroRAT Full Setup + Clean Download + Port Forwar...
- (12) TRICK2. BREAKING DOWN PARTS BY PARTS Open... ...
- (41) FACT - Timeline PhotosFACT CREATE FACEBOOK PA...
- How To Create Facebook Page Without Name : BY ANUJ...
- (¯`·._.·ha3ker-site·._.·´¯)Hello Friends! Welcome ...
- (5) HACKING AND SECURITYAdd your friends to this g...
- (103) FacebookTop 10 Best C/C++ Compilers And IDEs...
- (101) Facebook________ Open Your Backtrack termina...
- (99) Facebook5 Ways to use linux in windows Linux ...
- (10) Hacking Trick - You cannot convert a facebook...
- (3) Facebookpecial Request to all my dear brother ...
- #Admin >>What are some of the main reasons why ...
- (85) Bypass UAC Protection of Remote Windows PC in...
- (3) All Tech Free - Defraggler PRO With Keys Free ...
- (2) #Admin >>Create Barcodes using Excel<< Steps-....
- (10) How To Hack Windows Admin. Password With the....
- (6) #Admin >>Chat with your friends in MS DOS<< 1)...
- (2) #Admin >>How to remove password from WinRAR......
- (6) FacebookHacking Windows 7 Logon Password Witho...
- (3) Hidden Android Secret Codes :... - Cybercells ...
- #Admin >>What is the difference between... - TOP W...
- Best Youtube Tricks Every Internet User Should... ...
- (65) #Admin >>What does a server do?<< ->>:A... - ...
- (62) Hello Friends. There is a new trick that... -...
- vb.net textbox... - تبادل الخبرات في مجال الحاسبvb...
- (112) FacebookHappy National Chocolate Day! Make H...
- (2) Adobe Photoshop Lightroom v5.6 Multilingual......
- (60) Danger Hackers (Public Hacking Group)Hurrah! ...
- (12) Muslim HackersHACKING without any hardwork bo...
- CREATING SERVER
- (1) CS Server(ADSL) CREATING SERVER 1.Go to... - C...
-
▼
October
(494)
0 comments:
Post a Comment