Hi,

I've looked again at Debian bug #284875 and I can't see how to reproduce
the fourth part, either:

> (4) Just about any stupid hack will work with wget.  %00 bytes (see the
> POC) and other %-escaped control characters handling, symlink attacks:
>       
>       $ cd /tmp
>       $ ln -s index.html /path/to/foo
>       $ wget -x http://localhost/
>               -> /path/to/foo

In my tests wget does sanitize the input, so these attacks would seem to 
be fruitless. Could you explain in further detail how to reproduce this?



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to