The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/4928 - | |
References | () http://www.gulftech.org/?node=research&article_id=00132-10202008 - | |
References | () http://www.securityfocus.com/bid/31891 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/48168 - | |
References | () https://www.exploit-db.com/exploits/6822 - |
Information
Published : 2009-01-21 02:30
Updated : 2024-11-21 00:55
NVD link : CVE-2008-5920
Mitre link : CVE-2008-5920
CVE.ORG link : CVE-2008-5920
JSON object : View
Products Affected
tigris
- websvn
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')