<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for wget is now available for openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2024-2497</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2024-12-06</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2024-12-06</InitialReleaseDate>
		<CurrentReleaseDate>2024-12-06</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2024-12-06</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">wget security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for wget is now available for openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">GNU Wget is a free software package for retrieving files using HTTP, HTTPS, FTP and FTPS the most widely-used Internet protocols. It is a non-interactive commandline tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc.

Security Fix(es):

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.(CVE-2024-10524)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for wget is now available for openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">wget</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2497</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-10524</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-10524</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="wget-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">wget-1.21.2-6.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">wget-debuginfo-1.21.2-6.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">wget-debugsource-1.21.2-6.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">wget-help-1.21.2-6.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-1.20.3-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">wget-1.20.3-6.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.20.3-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">wget-debuginfo-1.20.3-6.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.20.3-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">wget-debugsource-1.20.3-6.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.20.3-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">wget-help-1.20.3-6.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">wget-1.21.2-6.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">wget-debuginfo-1.21.2-6.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">wget-debugsource-1.21.2-6.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">wget-help-1.21.2-6.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-1.21.4-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">wget-1.21.4-3.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.21.4-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">wget-debuginfo-1.21.4-3.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.21.4-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">wget-debugsource-1.21.4-3.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.21.4-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">wget-help-1.21.4-3.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">wget-1.21.2-6.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">wget-debuginfo-1.21.2-6.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">wget-debugsource-1.21.2-6.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">wget-help-1.21.2-6.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="wget-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">wget-1.21.2-6.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="wget-1.20.3-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">wget-1.20.3-6.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="wget-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">wget-1.21.2-6.oe2203sp1.src.rpm</FullProductName>
			<FullProductName ProductID="wget-1.21.4-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">wget-1.21.4-3.oe2403.src.rpm</FullProductName>
			<FullProductName ProductID="wget-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">wget-1.21.2-6.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="wget-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">wget-1.21.2-6.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">wget-debuginfo-1.21.2-6.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">wget-debugsource-1.21.2-6.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">wget-help-1.21.2-6.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-1.20.3-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">wget-1.20.3-6.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.20.3-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">wget-debuginfo-1.20.3-6.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.20.3-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">wget-debugsource-1.20.3-6.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.20.3-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">wget-help-1.20.3-6.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">wget-1.21.2-6.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">wget-debuginfo-1.21.2-6.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">wget-debugsource-1.21.2-6.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">wget-help-1.21.2-6.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-1.21.4-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">wget-1.21.4-3.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.21.4-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">wget-debuginfo-1.21.4-3.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.21.4-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">wget-debugsource-1.21.4-3.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.21.4-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">wget-help-1.21.4-3.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">wget-1.21.2-6.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debuginfo-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">wget-debuginfo-1.21.2-6.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-debugsource-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">wget-debugsource-1.21.2-6.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="wget-help-1.21.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">wget-help-1.21.2-6.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.</Note>
		</Notes>
		<ReleaseDate>2024-12-06</ReleaseDate>
		<CVE>CVE-2024-10524</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>wget security update</Description>
				<DATE>2024-12-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2497</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>