vendor:
WebSVN
by:
Tim Armes
8.8
CVSS
HIGH
WebSVN <= 2.0 Multiple Vulnerabilities
79
CWE
Product Name: WebSVN
Affected Version From: WebSVN <= 2.0
Affected Version To: WebSVN <= 2.0
Patch Exists: YES
Related CWE: N/A
CPE: a:websvn:websvn
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
WebSVN <= 2.0 Multiple Vulnerabilities
WebSVN is an online SVN repository viewer. There are a several issues in WebSVN which may allow for an attacker to conduct cross site scripting attacks, and create arbitrary files. There is a Cross Site Scripting issue in WebSVN due to the unsafe usage of the PHP_SELF server variable within the getParameterisedSelfUrl() function. A url like the one above would display a JavaScript alert window containing the cookie data of any set cookies for the domain. There are also some file handling issues in the RSS functionality used by WebSVN. The issue is caused by the lack of proper sanitization of the "rev" request variable, which allows arbitrary file operations to be executed.
Mitigation:
Ensure that all user-supplied input is properly sanitized and validated.