6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
78.8%
Secunia reports:
Some vulnerabilities have been reported in WebSVN, which can be
exploited by malicious users to disclose sensitive information, and by
malicious people to conduct cross-site scripting attacks and
manipulate data.
Input passed in the URL to index.php is not properly sanitised
before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a userβs browser session in context
of an affected site.
Input passed to the βrevβ parameter in rss.php is not properly
sanitised before being used. This can be exploited to overwrite
arbitrary files via directory traversal attacks.
Access to restricted repositories is not properly enforced, which
can be exploited to disclose potentially sensitive information by
accessing the repository via βlisting.phpβ and using the βcompare with
previousβ and βshow changed filesβ links.