CVE-2021-32305

WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
References
Link Resource
http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://github.com/websvnphp/websvn/pull/142 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:websvn:websvn:*:*:*:*:*:*:*:*

History

01 Jan 2022, 17:53

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry

22 Jun 2021, 21:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html -

24 May 2021, 17:13

Type Values Removed Values Added
CWE CWE-78
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8
References (MISC) https://github.com/websvnphp/websvn/pull/142 - (MISC) https://github.com/websvnphp/websvn/pull/142 - Issue Tracking, Patch, Third Party Advisory
CPE cpe:2.3:a:websvn:websvn:*:*:*:*:*:*:*:*

18 May 2021, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-18 17:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32305

Mitre link : CVE-2021-32305

CVE.ORG link : CVE-2021-32305


JSON object : View

Products Affected

websvn

  • websvn
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')