FreeBSD : websvn -- multiple vulnerabilities (71597e3e-f6b8-11dd-94d9-0030843d3802)

Medium Nessus Plugin ID 35625


The remote FreeBSD host is missing a security-related update.


Secunia reports :

Some vulnerabilities have been reported in WebSVN, which can be exploited by malicious users to disclose sensitive information, and by malicious people to conduct cross-site scripting attacks and manipulate data.

Input passed in the URL to index.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Input passed to the 'rev' parameter in rss.php is not properly sanitised before being used. This can be exploited to overwrite arbitrary files via directory traversal attacks.

Access to restricted repositories is not properly enforced, which can be exploited to disclose potentially sensitive information by accessing the repository via 'listing.php' and using the 'compare with previous' and 'show changed files' links.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 35625

File Name: freebsd_pkg_71597e3ef6b811dd94d90030843d3802.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2009/02/09

Modified: 2016/12/08

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:websvn, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2009/02/09

Vulnerability Publication Date: 2008/10/23

Reference Information

CVE: CVE-2008-5918, CVE-2008-5919, CVE-2009-0240

Secunia: 32338

CWE: 22, 79, 264