First published: Tue Oct 26 2021(Updated: )
A flaw was found in WebSVN 2.3.2. Without prior authentication, if the 'allowDownload' option is enabled in config.php, an attacker can invoke the dl.php script and pass a well formed 'path' argument to execute arbitrary commands against the underlying operating system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Websvn Websvn | =2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw is CVE-2011-2195.
CVE-2011-2195 has a severity of critical.
The affected software is WebSVN version 2.3.2.
An attacker can execute arbitrary commands against the underlying operating system.
No, authentication is not required to exploit this vulnerability.
To fix this vulnerability, disable the 'allowDownload' option in the config.php file of WebSVN or update to a version that includes a patch.