CVE-2024-38428
NixOS vulnerability analysis and mitigation

Overview

CVE-2024-38428 affects GNU Wget through version 1.24.5, where the software incorrectly handles semicolons in the userinfo subcomponent of a URI. The vulnerability was discovered in June 2024 and affects all versions of Wget up to and including 1.24.5. The issue lies in the url.c file, which mishandles semicolons in the userinfo part of URLs, potentially causing data intended for the userinfo subcomponent to be misinterpreted as part of the host subcomponent (JFrog Blog, NVD).

Technical details

The vulnerability stems from an implementation flaw in the urlskipcredentials() function within url.c. According to RFC 2396, semicolons are allowed in the userinfo segment of a URI, but Wget's implementation incorrectly treats semicolons as URL terminators. This causes the parser to misinterpret the URI structure when semicolons are present in the userinfo component. The vulnerability has been assigned a CVSS v3.1 score of 9.1 (Critical), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N (JFrog Blog, NVD).

Impact

The vulnerability can lead to several severe security implications. When exploited, it can result in DNS queries being sent to incorrect or potentially malicious domains. This can lead to resource restriction bypass, sensitive information exposure, and in some cases, remote code execution. The impact is particularly severe when Wget is used with FTP or FTPS URLs, where the attacker can completely replace the hostname that Wget connects to (JFrog Blog).

Mitigation and workarounds

While no official fixed version was available at the time of initial disclosure, several Linux distributions including Red Hat, Ubuntu, Debian, and SUSE have published fixed versions of Wget. For systems without access to these patches, the vulnerability can be mitigated by either preventing semicolons in the userinfo part of URIs or by disallowing user-provided data in the userinfo component (JFrog Blog, Ubuntu).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management