FreeBSD : websvn -- multiple vulnerabilities (71597e3e-f6b8-11dd-94d9-0030843d3802)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

Some vulnerabilities have been reported in WebSVN, which can be
exploited by malicious users to disclose sensitive information, and by
malicious people to conduct cross-site scripting attacks and
manipulate data.

Input passed in the URL to index.php is not properly sanitised before
being returned to the user. This can be exploited to execute arbitrary
HTML and script code in a user's browser session in context of an
affected site.

Input passed to the 'rev' parameter in rss.php is not properly
sanitised before being used. This can be exploited to overwrite
arbitrary files via directory traversal attacks.

Access to restricted repositories is not properly enforced, which can
be exploited to disclose potentially sensitive information by
accessing the repository via 'listing.php' and using the 'compare with
previous' and 'show changed files' links.

See also :

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191
http://www.gulftech.org/?node=research&article_id=00132-10202008
http://www.nessus.org/u?9404b0f1

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 35625 (freebsd_pkg_71597e3ef6b811dd94d90030843d3802.nasl)

Bugtraq ID:

CVE ID: CVE-2008-5918
CVE-2008-5919
CVE-2009-0240

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now