Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/32338 - Vendor Advisory | |
References | () http://secunia.com/advisories/34191 - | |
References | () http://securityreason.com/securityalert/4928 - | |
References | () http://websvn.tigris.org/issues/show_bug.cgi?id=179 - | |
References | () http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218 - Patch | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml - | |
References | () http://www.gulftech.org/?node=research&article_id=00132-10202008 - Exploit | |
References | () http://www.securityfocus.com/bid/31891 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/46050 - | |
References | () https://www.exploit-db.com/exploits/6822 - |
Information
Published : 2009-01-21 02:30
Updated : 2024-11-21 00:55
NVD link : CVE-2008-5919
Mitre link : CVE-2008-5919
CVE.ORG link : CVE-2008-5919
JSON object : View
Products Affected
tigris
- websvn
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')