Search criteria

12 vulnerabilities found for websvn by tigris

FKIE_CVE-2008-5919

Vulnerability from fkie_nvd - Published: 2009-01-21 02:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter.
References
cve@mitre.orghttp://secunia.com/advisories/32338Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/34191
cve@mitre.orghttp://securityreason.com/securityalert/4928
cve@mitre.orghttp://websvn.tigris.org/issues/show_bug.cgi?id=179
cve@mitre.orghttp://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218Patch
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200903-20.xml
cve@mitre.orghttp://www.gulftech.org/?node=research&article_id=00132-10202008Exploit
cve@mitre.orghttp://www.securityfocus.com/bid/31891Exploit
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/46050
cve@mitre.orghttps://www.exploit-db.com/exploits/6822
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32338Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34191
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4928
af854a3a-2127-422b-91ae-364da2661108http://websvn.tigris.org/issues/show_bug.cgi?id=179
af854a3a-2127-422b-91ae-364da2661108http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218Patch
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gulftech.org/?node=research&article_id=00132-10202008Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31891Exploit
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/46050
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/6822
Impacted products
Vendor Product Version
tigris websvn *
tigris websvn 1.00
tigris websvn 1.01
tigris websvn 1.02
tigris websvn 1.03
tigris websvn 1.04
tigris websvn 1.10
tigris websvn 1.20
tigris websvn 1.31a
tigris websvn 1.32
tigris websvn 1.33
tigris websvn 1.34
tigris websvn 1.37
tigris websvn 1.38
tigris websvn 1.39
tigris websvn 1.40
tigris websvn 1.51
tigris websvn 1.60
tigris websvn 1.61
tigris websvn 1.62

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tigris:websvn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5C51792-F7E8-4847-ADDA-50065DD8ADCD",
              "versionEndIncluding": "2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5184AC02-1F9D-4986-A08A-837A9CCA79D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE26E8A6-A516-4D1D-894D-E23AABA51A7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFDC8A10-08EB-4444-8771-4493E491DD21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B1AFDE-3DF3-4F9D-B6C9-54AD7F1F056C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F420EE5-22E2-42B7-A906-EA9FEC4053DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "31688948-CC90-46AA-AB3A-B66B88E465FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDBFBAEE-7B71-4D40-ACA1-BCFC889C0D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.31a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E889518B-485B-4CD3-996B-7198DFBAD805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "648D1220-2387-497E-BBAE-82D43903754A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAF04A7-4D3C-4A56-99BA-3075D59DA136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF1A838-B8B8-4395-9317-8A6A2552C2D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28A169D-4C20-42A5-9947-D996710D5705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BE03BE-1122-4A78-9E7C-9ADA01DCD8C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AEFAEA8-7A6E-430A-87DD-C6C9C55D5ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "07CF6D7C-8F68-47F3-BD5B-0720B33EB89D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC5AAC1-6110-4282-824C-6A660BEC5517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C26622F-C77F-42AB-AA6A-F13B3A12DB7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0152F8-71BA-4C7D-A8A1-72340B6924C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "58024D23-C2D7-42E9-B0A2-7F774939241A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en rss.php en WebSVN v2.0 y anteriores, cuando magic_quotes_gpc est\u00e1 deshabilitado, permite a atacantes remotos sobrescribir ficheros de su elecci\u00f3n a trav\u00e9s de secuencias de salto de directorio en el par\u00e1metro \"rev\"."
    }
  ],
  "id": "CVE-2008-5919",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-01-21T02:30:00.267",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32338"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34191"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4928"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31891"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/6822"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32338"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/6822"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0240

Vulnerability from fkie_nvd - Published: 2009-01-21 02:30 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tigris:websvn:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F686556C-9E63-48A6-A497-FC0103FFEA27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "listing.php in WebSVN 2.0 and possibly 1.7 beta, when using an SVN authz file, allows remote authenticated users to read changelogs or diffs for restricted projects via a modified repname parameter."
    },
    {
      "lang": "es",
      "value": "listing.php en WebSVN 2.0 y posiblemente 1.7 beta, cuando utilizan un fichero SVN authz, permite a usuarios autenticados remotamente leer changelogs o diffs para proyectos restringidos a trav\u00e9s del par\u00e1metro modificado \"repname\"."
    }
  ],
  "id": "CVE-2009-0240",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-01-21T02:30:00.327",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32338"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33945"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34191"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1725"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/18/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32338"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33945"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/18/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48171"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-5918

Vulnerability from fkie_nvd - Published: 2009-01-21 02:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
References
cve@mitre.orghttp://secunia.com/advisories/32338Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/34191
cve@mitre.orghttp://securityreason.com/securityalert/4928
cve@mitre.orghttp://websvn.tigris.org/issues/show_bug.cgi?id=179
cve@mitre.orghttp://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218Patch
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200903-20.xml
cve@mitre.orghttp://www.gulftech.org/?node=research&article_id=00132-10202008Exploit
cve@mitre.orghttp://www.securityfocus.com/bid/31891Exploit
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/46048
cve@mitre.orghttps://www.exploit-db.com/exploits/6822
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32338Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34191
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4928
af854a3a-2127-422b-91ae-364da2661108http://websvn.tigris.org/issues/show_bug.cgi?id=179
af854a3a-2127-422b-91ae-364da2661108http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218Patch
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gulftech.org/?node=research&article_id=00132-10202008Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31891Exploit
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/46048
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/6822
Impacted products
Vendor Product Version
tigris websvn *
tigris websvn 1.00
tigris websvn 1.01
tigris websvn 1.02
tigris websvn 1.03
tigris websvn 1.04
tigris websvn 1.10
tigris websvn 1.20
tigris websvn 1.31a
tigris websvn 1.32
tigris websvn 1.33
tigris websvn 1.34
tigris websvn 1.37
tigris websvn 1.38
tigris websvn 1.39
tigris websvn 1.40
tigris websvn 1.51
tigris websvn 1.60
tigris websvn 1.61
tigris websvn 1.62

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tigris:websvn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5C51792-F7E8-4847-ADDA-50065DD8ADCD",
              "versionEndIncluding": "2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5184AC02-1F9D-4986-A08A-837A9CCA79D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE26E8A6-A516-4D1D-894D-E23AABA51A7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFDC8A10-08EB-4444-8771-4493E491DD21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B1AFDE-3DF3-4F9D-B6C9-54AD7F1F056C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F420EE5-22E2-42B7-A906-EA9FEC4053DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "31688948-CC90-46AA-AB3A-B66B88E465FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDBFBAEE-7B71-4D40-ACA1-BCFC889C0D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.31a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E889518B-485B-4CD3-996B-7198DFBAD805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "648D1220-2387-497E-BBAE-82D43903754A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAF04A7-4D3C-4A56-99BA-3075D59DA136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF1A838-B8B8-4395-9317-8A6A2552C2D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28A169D-4C20-42A5-9947-D996710D5705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BE03BE-1122-4A78-9E7C-9ADA01DCD8C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AEFAEA8-7A6E-430A-87DD-C6C9C55D5ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "07CF6D7C-8F68-47F3-BD5B-0720B33EB89D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC5AAC1-6110-4282-824C-6A660BEC5517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C26622F-C77F-42AB-AA6A-F13B3A12DB7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0152F8-71BA-4C7D-A8A1-72340B6924C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "58024D23-C2D7-42E9-B0A2-7F774939241A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funci\u00f3n getParameterisedSelfUrl en index.php en WebSVN v2.0 y anteriores permite a atacantes remotos inyectar secuencias de comando web o HTML de su elecci\u00f3n a trav\u00e9s de PATH_INFO."
    }
  ],
  "id": "CVE-2008-5918",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-01-21T02:30:00.250",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32338"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34191"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4928"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31891"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46048"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/6822"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32338"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46048"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/6822"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-5920

Vulnerability from fkie_nvd - Published: 2009-01-21 02:30 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5184AC02-1F9D-4986-A08A-837A9CCA79D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE26E8A6-A516-4D1D-894D-E23AABA51A7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFDC8A10-08EB-4444-8771-4493E491DD21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B1AFDE-3DF3-4F9D-B6C9-54AD7F1F056C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F420EE5-22E2-42B7-A906-EA9FEC4053DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "31688948-CC90-46AA-AB3A-B66B88E465FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDBFBAEE-7B71-4D40-ACA1-BCFC889C0D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.31a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E889518B-485B-4CD3-996B-7198DFBAD805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "648D1220-2387-497E-BBAE-82D43903754A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAF04A7-4D3C-4A56-99BA-3075D59DA136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF1A838-B8B8-4395-9317-8A6A2552C2D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28A169D-4C20-42A5-9947-D996710D5705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BE03BE-1122-4A78-9E7C-9ADA01DCD8C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AEFAEA8-7A6E-430A-87DD-C6C9C55D5ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "07CF6D7C-8F68-47F3-BD5B-0720B33EB89D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC5AAC1-6110-4282-824C-6A660BEC5517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C26622F-C77F-42AB-AA6A-F13B3A12DB7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0152F8-71BA-4C7D-A8A1-72340B6924C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tigris:websvn:1.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "58024D23-C2D7-42E9-B0A2-7F774939241A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n create_anchors en utils.inc en WebSVN v1.x permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de nombres de usuario manipulados que es procesado por la funci\u00f3n preg_replace con el switch \"eval\"."
    }
  ],
  "evaluatorSolution": "Patch information - http://websvn.tigris.org/",
  "id": "CVE-2008-5920",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-01-21T02:30:00.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4928"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31891"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/6822"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/6822"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-5918 (GCVE-0-2008-5918)

Vulnerability from cvelistv5 – Published: 2009-01-21 02:00 – Updated: 2024-08-07 11:13
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://websvn.tigris.org/servlets/NewsItemView?ne… x_refsource_CONFIRM
http://secunia.com/advisories/34191 third-party-advisoryx_refsource_SECUNIA
https://www.exploit-db.com/exploits/6822 exploitx_refsource_EXPLOIT-DB
http://websvn.tigris.org/issues/show_bug.cgi?id=179 x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.gentoo.org/security/en/glsa/glsa-20090… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/31891 vdb-entryx_refsource_BID
http://securityreason.com/securityalert/4928 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/32338 third-party-advisoryx_refsource_SECUNIA
http://www.gulftech.org/?node=research&article_id… x_refsource_MISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:13:13.199Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
          },
          {
            "name": "34191",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34191"
          },
          {
            "name": "6822",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6822"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
          },
          {
            "name": "websvn-index-xss(46048)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46048"
          },
          {
            "name": "GLSA-200903-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
          },
          {
            "name": "31891",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31891"
          },
          {
            "name": "4928",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4928"
          },
          {
            "name": "32338",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32338"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
        },
        {
          "name": "34191",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34191"
        },
        {
          "name": "6822",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6822"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
        },
        {
          "name": "websvn-index-xss(46048)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46048"
        },
        {
          "name": "GLSA-200903-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
        },
        {
          "name": "31891",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31891"
        },
        {
          "name": "4928",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4928"
        },
        {
          "name": "32338",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32338"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5918",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218",
              "refsource": "CONFIRM",
              "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
            },
            {
              "name": "34191",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34191"
            },
            {
              "name": "6822",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6822"
            },
            {
              "name": "http://websvn.tigris.org/issues/show_bug.cgi?id=179",
              "refsource": "CONFIRM",
              "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
            },
            {
              "name": "websvn-index-xss(46048)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46048"
            },
            {
              "name": "GLSA-200903-20",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
            },
            {
              "name": "31891",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31891"
            },
            {
              "name": "4928",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4928"
            },
            {
              "name": "32338",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32338"
            },
            {
              "name": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008",
              "refsource": "MISC",
              "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5918",
    "datePublished": "2009-01-21T02:00:00",
    "dateReserved": "2009-01-20T00:00:00",
    "dateUpdated": "2024-08-07T11:13:13.199Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5920 (GCVE-0-2008-5920)

Vulnerability from cvelistv5 – Published: 2009-01-21 02:00 – Updated: 2024-08-07 11:13
VLAI?
Summary
The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:13:13.517Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "6822",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6822"
          },
          {
            "name": "31891",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31891"
          },
          {
            "name": "websvn-createanchors-code-execution(48168)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"
          },
          {
            "name": "4928",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4928"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "6822",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6822"
        },
        {
          "name": "31891",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31891"
        },
        {
          "name": "websvn-createanchors-code-execution(48168)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"
        },
        {
          "name": "4928",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4928"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5920",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "6822",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6822"
            },
            {
              "name": "31891",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31891"
            },
            {
              "name": "websvn-createanchors-code-execution(48168)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"
            },
            {
              "name": "4928",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4928"
            },
            {
              "name": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008",
              "refsource": "MISC",
              "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5920",
    "datePublished": "2009-01-21T02:00:00",
    "dateReserved": "2009-01-20T00:00:00",
    "dateUpdated": "2024-08-07T11:13:13.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0240 (GCVE-0-2009-0240)

Vulnerability from cvelistv5 – Published: 2009-01-21 02:00 – Updated: 2024-08-07 04:24
VLAI?
Summary
listing.php in WebSVN 2.0 and possibly 1.7 beta, when using an SVN authz file, allows remote authenticated users to read changelogs or diffs for restricted projects via a modified repname parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/33945 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/34191 third-party-advisoryx_refsource_SECUNIA
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191 x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20090… vendor-advisoryx_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.openwall.com/lists/oss-security/2009/01/18/2 mailing-listx_refsource_MLIST
http://secunia.com/advisories/32338 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1725 vendor-advisoryx_refsource_DEBIAN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:24:18.369Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "33945",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33945"
          },
          {
            "name": "34191",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34191"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191"
          },
          {
            "name": "GLSA-200903-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
          },
          {
            "name": "websvn-listing-information-disclosure(48171)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48171"
          },
          {
            "name": "[oss-security] 20090118 CVE request: WebSVN",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/01/18/2"
          },
          {
            "name": "32338",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32338"
          },
          {
            "name": "DSA-1725",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1725"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "listing.php in WebSVN 2.0 and possibly 1.7 beta, when using an SVN authz file, allows remote authenticated users to read changelogs or diffs for restricted projects via a modified repname parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "33945",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33945"
        },
        {
          "name": "34191",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34191"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191"
        },
        {
          "name": "GLSA-200903-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
        },
        {
          "name": "websvn-listing-information-disclosure(48171)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48171"
        },
        {
          "name": "[oss-security] 20090118 CVE request: WebSVN",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/01/18/2"
        },
        {
          "name": "32338",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32338"
        },
        {
          "name": "DSA-1725",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1725"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0240",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "listing.php in WebSVN 2.0 and possibly 1.7 beta, when using an SVN authz file, allows remote authenticated users to read changelogs or diffs for restricted projects via a modified repname parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "33945",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33945"
            },
            {
              "name": "34191",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34191"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191"
            },
            {
              "name": "GLSA-200903-20",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
            },
            {
              "name": "websvn-listing-information-disclosure(48171)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48171"
            },
            {
              "name": "[oss-security] 20090118 CVE request: WebSVN",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/01/18/2"
            },
            {
              "name": "32338",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32338"
            },
            {
              "name": "DSA-1725",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1725"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0240",
    "datePublished": "2009-01-21T02:00:00",
    "dateReserved": "2009-01-20T00:00:00",
    "dateUpdated": "2024-08-07T04:24:18.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5919 (GCVE-0-2008-5919)

Vulnerability from cvelistv5 – Published: 2009-01-21 02:00 – Updated: 2024-08-07 11:13
VLAI?
Summary
Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://websvn.tigris.org/servlets/NewsItemView?ne… x_refsource_CONFIRM
http://secunia.com/advisories/34191 third-party-advisoryx_refsource_SECUNIA
https://www.exploit-db.com/exploits/6822 exploitx_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://websvn.tigris.org/issues/show_bug.cgi?id=179 x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20090… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/31891 vdb-entryx_refsource_BID
http://securityreason.com/securityalert/4928 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/32338 third-party-advisoryx_refsource_SECUNIA
http://www.gulftech.org/?node=research&article_id… x_refsource_MISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:13:13.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
          },
          {
            "name": "34191",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34191"
          },
          {
            "name": "6822",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6822"
          },
          {
            "name": "websvn-rss-directory-traversal(46050)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
          },
          {
            "name": "GLSA-200903-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
          },
          {
            "name": "31891",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31891"
          },
          {
            "name": "4928",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4928"
          },
          {
            "name": "32338",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32338"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
        },
        {
          "name": "34191",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34191"
        },
        {
          "name": "6822",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6822"
        },
        {
          "name": "websvn-rss-directory-traversal(46050)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
        },
        {
          "name": "GLSA-200903-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
        },
        {
          "name": "31891",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31891"
        },
        {
          "name": "4928",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4928"
        },
        {
          "name": "32338",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32338"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5919",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218",
              "refsource": "CONFIRM",
              "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
            },
            {
              "name": "34191",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34191"
            },
            {
              "name": "6822",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6822"
            },
            {
              "name": "websvn-rss-directory-traversal(46050)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050"
            },
            {
              "name": "http://websvn.tigris.org/issues/show_bug.cgi?id=179",
              "refsource": "CONFIRM",
              "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
            },
            {
              "name": "GLSA-200903-20",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
            },
            {
              "name": "31891",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31891"
            },
            {
              "name": "4928",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4928"
            },
            {
              "name": "32338",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32338"
            },
            {
              "name": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008",
              "refsource": "MISC",
              "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5919",
    "datePublished": "2009-01-21T02:00:00",
    "dateReserved": "2009-01-20T00:00:00",
    "dateUpdated": "2024-08-07T11:13:13.273Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5918 (GCVE-0-2008-5918)

Vulnerability from nvd – Published: 2009-01-21 02:00 – Updated: 2024-08-07 11:13
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://websvn.tigris.org/servlets/NewsItemView?ne… x_refsource_CONFIRM
http://secunia.com/advisories/34191 third-party-advisoryx_refsource_SECUNIA
https://www.exploit-db.com/exploits/6822 exploitx_refsource_EXPLOIT-DB
http://websvn.tigris.org/issues/show_bug.cgi?id=179 x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.gentoo.org/security/en/glsa/glsa-20090… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/31891 vdb-entryx_refsource_BID
http://securityreason.com/securityalert/4928 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/32338 third-party-advisoryx_refsource_SECUNIA
http://www.gulftech.org/?node=research&article_id… x_refsource_MISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:13:13.199Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
          },
          {
            "name": "34191",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34191"
          },
          {
            "name": "6822",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6822"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
          },
          {
            "name": "websvn-index-xss(46048)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46048"
          },
          {
            "name": "GLSA-200903-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
          },
          {
            "name": "31891",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31891"
          },
          {
            "name": "4928",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4928"
          },
          {
            "name": "32338",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32338"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
        },
        {
          "name": "34191",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34191"
        },
        {
          "name": "6822",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6822"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
        },
        {
          "name": "websvn-index-xss(46048)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46048"
        },
        {
          "name": "GLSA-200903-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
        },
        {
          "name": "31891",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31891"
        },
        {
          "name": "4928",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4928"
        },
        {
          "name": "32338",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32338"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5918",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218",
              "refsource": "CONFIRM",
              "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
            },
            {
              "name": "34191",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34191"
            },
            {
              "name": "6822",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6822"
            },
            {
              "name": "http://websvn.tigris.org/issues/show_bug.cgi?id=179",
              "refsource": "CONFIRM",
              "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
            },
            {
              "name": "websvn-index-xss(46048)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46048"
            },
            {
              "name": "GLSA-200903-20",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
            },
            {
              "name": "31891",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31891"
            },
            {
              "name": "4928",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4928"
            },
            {
              "name": "32338",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32338"
            },
            {
              "name": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008",
              "refsource": "MISC",
              "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5918",
    "datePublished": "2009-01-21T02:00:00",
    "dateReserved": "2009-01-20T00:00:00",
    "dateUpdated": "2024-08-07T11:13:13.199Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5920 (GCVE-0-2008-5920)

Vulnerability from nvd – Published: 2009-01-21 02:00 – Updated: 2024-08-07 11:13
VLAI?
Summary
The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:13:13.517Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "6822",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6822"
          },
          {
            "name": "31891",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31891"
          },
          {
            "name": "websvn-createanchors-code-execution(48168)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"
          },
          {
            "name": "4928",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4928"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "6822",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6822"
        },
        {
          "name": "31891",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31891"
        },
        {
          "name": "websvn-createanchors-code-execution(48168)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"
        },
        {
          "name": "4928",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4928"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5920",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "6822",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6822"
            },
            {
              "name": "31891",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31891"
            },
            {
              "name": "websvn-createanchors-code-execution(48168)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"
            },
            {
              "name": "4928",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4928"
            },
            {
              "name": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008",
              "refsource": "MISC",
              "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5920",
    "datePublished": "2009-01-21T02:00:00",
    "dateReserved": "2009-01-20T00:00:00",
    "dateUpdated": "2024-08-07T11:13:13.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0240 (GCVE-0-2009-0240)

Vulnerability from nvd – Published: 2009-01-21 02:00 – Updated: 2024-08-07 04:24
VLAI?
Summary
listing.php in WebSVN 2.0 and possibly 1.7 beta, when using an SVN authz file, allows remote authenticated users to read changelogs or diffs for restricted projects via a modified repname parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/33945 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/34191 third-party-advisoryx_refsource_SECUNIA
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191 x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20090… vendor-advisoryx_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.openwall.com/lists/oss-security/2009/01/18/2 mailing-listx_refsource_MLIST
http://secunia.com/advisories/32338 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1725 vendor-advisoryx_refsource_DEBIAN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:24:18.369Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "33945",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33945"
          },
          {
            "name": "34191",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34191"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191"
          },
          {
            "name": "GLSA-200903-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
          },
          {
            "name": "websvn-listing-information-disclosure(48171)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48171"
          },
          {
            "name": "[oss-security] 20090118 CVE request: WebSVN",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/01/18/2"
          },
          {
            "name": "32338",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32338"
          },
          {
            "name": "DSA-1725",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1725"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "listing.php in WebSVN 2.0 and possibly 1.7 beta, when using an SVN authz file, allows remote authenticated users to read changelogs or diffs for restricted projects via a modified repname parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "33945",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33945"
        },
        {
          "name": "34191",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34191"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191"
        },
        {
          "name": "GLSA-200903-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
        },
        {
          "name": "websvn-listing-information-disclosure(48171)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48171"
        },
        {
          "name": "[oss-security] 20090118 CVE request: WebSVN",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/01/18/2"
        },
        {
          "name": "32338",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32338"
        },
        {
          "name": "DSA-1725",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1725"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0240",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "listing.php in WebSVN 2.0 and possibly 1.7 beta, when using an SVN authz file, allows remote authenticated users to read changelogs or diffs for restricted projects via a modified repname parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "33945",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33945"
            },
            {
              "name": "34191",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34191"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191"
            },
            {
              "name": "GLSA-200903-20",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
            },
            {
              "name": "websvn-listing-information-disclosure(48171)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48171"
            },
            {
              "name": "[oss-security] 20090118 CVE request: WebSVN",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/01/18/2"
            },
            {
              "name": "32338",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32338"
            },
            {
              "name": "DSA-1725",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1725"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0240",
    "datePublished": "2009-01-21T02:00:00",
    "dateReserved": "2009-01-20T00:00:00",
    "dateUpdated": "2024-08-07T04:24:18.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5919 (GCVE-0-2008-5919)

Vulnerability from nvd – Published: 2009-01-21 02:00 – Updated: 2024-08-07 11:13
VLAI?
Summary
Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://websvn.tigris.org/servlets/NewsItemView?ne… x_refsource_CONFIRM
http://secunia.com/advisories/34191 third-party-advisoryx_refsource_SECUNIA
https://www.exploit-db.com/exploits/6822 exploitx_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://websvn.tigris.org/issues/show_bug.cgi?id=179 x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20090… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/31891 vdb-entryx_refsource_BID
http://securityreason.com/securityalert/4928 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/32338 third-party-advisoryx_refsource_SECUNIA
http://www.gulftech.org/?node=research&article_id… x_refsource_MISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:13:13.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
          },
          {
            "name": "34191",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34191"
          },
          {
            "name": "6822",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6822"
          },
          {
            "name": "websvn-rss-directory-traversal(46050)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
          },
          {
            "name": "GLSA-200903-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
          },
          {
            "name": "31891",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31891"
          },
          {
            "name": "4928",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4928"
          },
          {
            "name": "32338",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32338"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
        },
        {
          "name": "34191",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34191"
        },
        {
          "name": "6822",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6822"
        },
        {
          "name": "websvn-rss-directory-traversal(46050)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
        },
        {
          "name": "GLSA-200903-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
        },
        {
          "name": "31891",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31891"
        },
        {
          "name": "4928",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4928"
        },
        {
          "name": "32338",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32338"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5919",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218",
              "refsource": "CONFIRM",
              "url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218"
            },
            {
              "name": "34191",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34191"
            },
            {
              "name": "6822",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6822"
            },
            {
              "name": "websvn-rss-directory-traversal(46050)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050"
            },
            {
              "name": "http://websvn.tigris.org/issues/show_bug.cgi?id=179",
              "refsource": "CONFIRM",
              "url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179"
            },
            {
              "name": "GLSA-200903-20",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml"
            },
            {
              "name": "31891",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31891"
            },
            {
              "name": "4928",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4928"
            },
            {
              "name": "32338",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32338"
            },
            {
              "name": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008",
              "refsource": "MISC",
              "url": "http://www.gulftech.org/?node=research\u0026article_id=00132-10202008"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5919",
    "datePublished": "2009-01-21T02:00:00",
    "dateReserved": "2009-01-20T00:00:00",
    "dateUpdated": "2024-08-07T11:13:13.273Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}