WebSVN.Search.php.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in WebSVN.
The vulnerability is due to insufficient input validation of the requests submitted to Search.php. A remote, unauthenticated attacker can exploit the vulnerability by sending crafted requests to the server. Successful exploitation could result in arbitrary command execution with web server privileges on the target server.
Affected Products
WebSVN before 2.6.1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/websvnphp/websvn/pull/142
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2023-10-26 | 25.666 | Sig Added |
2021-09-22 | 18.163 | Default_action:pass:drop |
2021-09-08 | 18.153 |