CVE-2021-32305

WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
References
Link Resource
http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://github.com/websvnphp/websvn/pull/142 Issue Tracking Patch Third Party Advisory
http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://github.com/websvnphp/websvn/pull/142 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:websvn:websvn:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:06

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/websvnphp/websvn/pull/142 - Issue Tracking, Patch, Third Party Advisory () https://github.com/websvnphp/websvn/pull/142 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2021-05-18 17:15

Updated : 2024-11-21 06:06


NVD link : CVE-2021-32305

Mitre link : CVE-2021-32305

CVE.ORG link : CVE-2021-32305


JSON object : View

Products Affected

websvn

  • websvn
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')