|
|
| |
| WebSVN is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. |
| |
Credit:
The information has been provided by nospam@gmail.it.
The original article can be found at: http://www.securityfocus.com/bid/48102
|
| |
Vulnerable Systems:
*WebSVN WebSVN 2.3.2
Attackers can exploit this issue to execute arbitrary commands in the context of the application.
Vendor Status:
Currently, we are not aware of any vendor-supplied patches.
Disclosure Timeline:
Initial Release: Jun 03 2011
|
|
blog comments powered by
|