WebSVN.Search.php.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit a Command Injection Vulnerability in WebSVN.
The vulnerability is due to insufficient input validation of the requests submitted to Search.php. A remote, unauthenticated attacker can exploit the vulnerability by sending crafted requests to the server. Successful exploitation could result in arbitrary command execution with web server privileges on the target server.

affected-products-logoAffected Products

WebSVN before 2.6.1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://github.com/websvnphp/websvn/pull/142

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-10-26 25.666 Sig Added
2021-09-22 18.163 Default_action:pass:drop
2021-09-08 18.153