{
  "threat_severity" : "Moderate",
  "public_date" : "2024-06-01T00:00:00Z",
  "bugzilla" : {
    "description" : "wget: Misinterpretation of input may lead to improper behavior",
    "id" : "2292836",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2292836"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-115",
  "details" : [ "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.", "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials." ],
  "statement" : "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-08-13T00:00:00Z",
    "advisory" : "RHSA-2024:5299",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "wget-0:1.19.5-12.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2024-08-06T00:00:00Z",
    "advisory" : "RHSA-2024:4998",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "wget-0:1.19.5-10.el8_6.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2024-08-06T00:00:00Z",
    "advisory" : "RHSA-2024:4998",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "wget-0:1.19.5-10.el8_6.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2024-08-06T00:00:00Z",
    "advisory" : "RHSA-2024:4998",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "wget-0:1.19.5-10.el8_6.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support",
    "release_date" : "2024-09-03T00:00:00Z",
    "advisory" : "RHSA-2024:6208",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.8",
    "package" : "wget-0:1.19.5-11.el8_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-09-03T00:00:00Z",
    "advisory" : "RHSA-2024:6192",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "wget-0:1.21.1-8.el9_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-09-05T00:00:00Z",
    "advisory" : "RHSA-2024:6438",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "wget-0:1.21.1-7.el9_2.1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "wget2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "wget",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "wget",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-38428\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38428\nhttps://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" ],
  "name" : "CVE-2024-38428",
  "mitigation" : {
    "value" : "Make sure to not add semicolons in the userinfo subcomponent of a URI.",
    "lang" : "en:us"
  },
  "csaw" : false
}