{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T14:44:55.283","vulnerabilities":[{"cve":{"id":"CVE-2014-4877","sourceIdentifier":"cret@cert.org","published":"2014-10-29T10:55:05.417","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink."},{"lang":"es","value":"Vulnerabilidad de salto de ruta absoluta en GNU Wget anterior a 1.16, cuando la recursión esta habilitada, permite a servidores FTP remotos escribir a ficheros arbitrarios, y como consecuencia ejecutar código arbitrario, a través de una respuesta LIST que hace referencia al mismo nombre de fichero dentro de dos entradas, una de las cuales indica que el nombre de fichero es para un enlace simbólico."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","versionEndIncluding":"1.15","matchCriteriaId":"AC092879-65CD-4F25-80DA-70514D6B2A6E"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*","matchCriteriaId":"B5E5E724-5DC7-4264-BF3D-27CFB093AC03"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*","matchCriteriaId":"17D42285-E640-4EF9-8E1A-072C77F6A9C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*","matchCriteriaId":"EB7F0263-11A7-4E85-8A5D-FB41F6CDF784"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*","matchCriteriaId":"244D4F9A-4697-4DF2-9590-36203F19DA63"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*","matchCriteriaId":"1BE195AF-F305-4B47-8047-C20B1CB6BF31"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*","matchCriteriaId":"FC6F6840-CAA0-422D-89CF-920D8314A27B"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*","matchCriteriaId":"D225A5FC-7BA8-4DD8-9A9F-6AAA3D15A8A2"}]}]}],"references":[{"url":"http://advisories.mageia.org/MGASA-2014-0431.html","source":"cret@cert.org"},{"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7","source":"cret@cert.org"},{"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0","source":"cret@cert.org","tags":["Patch"]},{"url":"http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html","source":"cret@cert.org","tags":["Patch"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html","source":"cret@cert.org"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html","source":"cret@cert.org"},{"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html","source":"cret@cert.org"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1764.html","source":"cret@cert.org"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1955.html","source":"cret@cert.org"},{"url":"http://security.gentoo.org/glsa/glsa-201411-05.xml","source":"cret@cert.org"},{"url":"http://www.debian.org/security/2014/dsa-3062","source":"cret@cert.org"},{"url":"http://www.kb.cert.org/vuls/id/685996","source":"cret@cert.org","tags":["Patch","US Government Resource"]},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:121","source":"cret@cert.org"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","source":"cret@cert.org"},{"url":"http://www.securityfocus.com/bid/70751","source":"cret@cert.org"},{"url":"http://www.ubuntu.com/usn/USN-2393-1","source":"cret@cert.org"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1139181","source":"cret@cert.org","tags":["Patch"]},{"url":"https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access","source":"cret@cert.org","tags":["Exploit"]},{"url":"https://github.com/rapid7/metasploit-framework/pull/4088","source":"cret@cert.org","tags":["Exploit"]},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917","source":"cret@cert.org"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","source":"cret@cert.org"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106","source":"cret@cert.org"},{"url":"http://advisories.mageia.org/MGASA-2014-0431.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1764.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1955.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://security.gentoo.org/glsa/glsa-201411-05.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2014/dsa-3062","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/685996","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","US Government Resource"]},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:121","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/70751","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/USN-2393-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1139181","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://github.com/rapid7/metasploit-framework/pull/4088","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}