First published: Wed Jan 21 2009(Updated: )
Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WebSVN | <=2.0 | |
WebSVN | =1.00 | |
WebSVN | =1.01 | |
WebSVN | =1.02 | |
WebSVN | =1.03 | |
WebSVN | =1.04 | |
WebSVN | =1.10 | |
WebSVN | =1.20 | |
WebSVN | =1.31a | |
WebSVN | =1.32 | |
WebSVN | =1.33 | |
WebSVN | =1.34 | |
WebSVN | =1.37 | |
WebSVN | =1.38 | |
WebSVN | =1.39 | |
WebSVN | =1.40 | |
WebSVN | =1.51 | |
WebSVN | =1.60 | |
WebSVN | =1.61 | |
WebSVN | =1.62 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5919 is considered to have a medium severity level due to its ability to allow unauthorized file overwrites.
To fix CVE-2008-5919, upgrade to a version of WebSVN higher than 2.0 or implement proper input validation to prevent directory traversal.
CVE-2008-5919 affects WebSVN versions up to and including 2.0, as well as specific earlier versions like 1.00 through 1.62.
CVE-2008-5919 is a directory traversal vulnerability that allows remote attackers to overwrite arbitrary files.
Yes, the vulnerability is present when magic_quotes_gpc is disabled, allowing exploitation through crafted input.