vendor:
Websvn
by:
g0ldm45k
9,8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: Websvn
Affected Version From: 2.6.0
Affected Version To: 2.6.0
Patch Exists: YES
Related CWE: CVE-2021-32305
CPE: 2.6.0
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=32305, https://www.infosecmatter.com/nessus-plugin-library/?id=65109, https://www.infosecmatter.com/nessus-plugin-library/?id=32377, https://www.infosecmatter.com/nessus-plugin-library/?id=65108, https://www.infosecmatter.com/nessus-plugin-library/?id=32357, https://www.infosecmatter.com/nessus-plugin-library/?id=32430, https://www.infosecmatter.com/nessus-plugin-library/?id=32359, https://www.infosecmatter.com/nessus-plugin-library/?id=31808, https://www.infosecmatter.com/nessus-plugin-library/?id=32321
Tags: cve,cve2021,websvn,rce,oast,packetstorm
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 1, 'vendor': 'websvn', 'product': 'websvn'}
Platforms Tested: Docker + Debian GNU/Linux (Buster)
2021
Websvn 2.6.0 – Remote Code Execution (Unauthenticated)
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
Mitigation:
Upgrade to the latest version of Websvn, which is not vulnerable to this exploit.