ID

VAR-E-201602-0212


CVE

cve_id:CVE-2016-2511

Trust: 1.1

cve_id:CVE-2018-16144

Trust: 0.5

cve_id:CVE-2018-16145

Trust: 0.5

cve_id:CVE-2018-16146

Trust: 0.5

cve_id:CVE-2018-16147

Trust: 0.5

cve_id:CVE-2018-16148

Trust: 0.5

sources: PACKETSTORM: 135886 // PACKETSTORM: 149236 // EDBNET: 37803

TITLE

WebSVN 2.3.3 Cross Site Scripting Vulnerability

Trust: 0.6

sources: EDBNET: 37803

AFFECTED PRODUCTS

vendor:websvnmodel: - scope:eqversion:2.3.3

Trust: 0.5

vendor:opsviewmodel:monitorscope:eqversion:5.x

Trust: 0.5

sources: PACKETSTORM: 135886 // PACKETSTORM: 149236

EXPLOIT

Title: WebSVN - Reflected Cross-Site Scripting
Author: Jakub Palaczynski
Date: 22. February 2016
CVE: CVE-2016-2511
Affected software:
==================
WebSVN 2.3.3
Older versions are probably also vulnerable.
Description:
============
WebSVN offers a view onto your subversion repositories that's been designed
to reflect the Subversion methodology. You can view the log of any file or
directory and see a list of all the files changed, added or deleted in any
given revision. You can also view the differences between two versions of a
file so as to see exactly what was changed in a particular revision.[1]
Vulnerability:
**************
Reflected Cross-Site Scripting:
===============================
Proof of Concept:
http://host/websvn/log.php?path=%00"><script>alert(document.domain)</script>
Fix:
It is adviced to change following line in include/setup.php file:
$path = !empty($_REQUEST['path']) ? $_REQUEST['path'] : null;
to:
$path = !empty($_REQUEST['path']) ? escape($_REQUEST['path']) : null;
"escape" function that is used to patch vulnerability was written by the
author and can be found in include/command.php file.
Reference:
==========
[1] Why WebSVN?:
http://www.websvn.info/

Trust: 0.6

sources: EDBNET: 37803

PRICE

free

Trust: 0.6

sources: EDBNET: 37803

TYPE

xss

Trust: 1.0

sources: PACKETSTORM: 135886 // PACKETSTORM: 149236

TAGS

tag:exploit

Trust: 1.0

tag:xss

Trust: 1.0

tag:remote

Trust: 0.5

tag:vulnerability

Trust: 0.5

sources: PACKETSTORM: 135886 // PACKETSTORM: 149236

EXTERNAL IDS

db:NVDid:CVE-2016-2511

Trust: 2.2

db:0DAYTODAYid:24999

Trust: 0.6

db:EDBNETid:37803

Trust: 0.6

db:0DAYTODAYid:31050

Trust: 0.6

db:EDBNETid:99221

Trust: 0.6

db:PACKETSTORMid:135886

Trust: 0.5

db:NVDid:CVE-2018-16145

Trust: 0.5

db:NVDid:CVE-2018-16147

Trust: 0.5

db:NVDid:CVE-2018-16146

Trust: 0.5

db:NVDid:CVE-2018-16148

Trust: 0.5

db:NVDid:CVE-2018-16144

Trust: 0.5

db:PACKETSTORMid:149236

Trust: 0.5

sources: PACKETSTORM: 135886 // PACKETSTORM: 149236 // EDBNET: 37803 // EDBNET: 99221

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2016-2511

Trust: 1.1

url:https://0day.today/exploits/24999

Trust: 0.6

url:https://0day.today/exploits/31050

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-16147

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-16145

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-16144

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-16146

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-16148

Trust: 0.5

sources: PACKETSTORM: 135886 // PACKETSTORM: 149236 // EDBNET: 37803 // EDBNET: 99221

SOURCES

db:PACKETSTORMid:135886
db:PACKETSTORMid:149236
db:EDBNETid:37803
db:EDBNETid:99221

LAST UPDATE DATE

2022-07-27T09:40:11.045000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:135886date:2016-02-22T23:02:22
db:PACKETSTORMid:149236date:2018-09-05T17:57:27
db:EDBNETid:37803date:2016-02-25T00:00:00
db:EDBNETid:99221date:2018-09-06T00:00:00