First published: Wed Jan 21 2009(Updated: )
The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WebSVN | =1.00 | |
WebSVN | =1.01 | |
WebSVN | =1.02 | |
WebSVN | =1.03 | |
WebSVN | =1.04 | |
WebSVN | =1.10 | |
WebSVN | =1.20 | |
WebSVN | =1.31a | |
WebSVN | =1.32 | |
WebSVN | =1.33 | |
WebSVN | =1.34 | |
WebSVN | =1.37 | |
WebSVN | =1.38 | |
WebSVN | =1.39 | |
WebSVN | =1.40 | |
WebSVN | =1.51 | |
WebSVN | =1.60 | |
WebSVN | =1.61 | |
WebSVN | =1.62 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5920 has a CVSS score indicating a high severity due to the potential for remote code execution.
To fix CVE-2008-5920, upgrade to WebSVN version 1.63 or later, which addresses this vulnerability.
CVE-2008-5920 affects WebSVN versions 1.00 through 1.62.
CVE-2008-5920 is a remote code execution vulnerability due to improper handling of user input.
Yes, CVE-2008-5920 can be exploited by remote attackers without requiring authentication.