WebSVN: Multiple vulnerabilities — GLSA 200903-20

Multiple vulnerabilities in WebSVN allow for file overwrite and information disclosure.

Affected packages

www-apps/websvn on all architectures
Affected versions < 2.1.0
Unaffected versions >= 2.1.0

Background

WebSVN is a web-based browsing tool for Subversion repositories written in PHP.

Description

  • James Bercegay of GulfTech Security reported a Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl() function in index.php (CVE-2008-5918) and a directory traversal vulnerability in rss.php when magic_quotes_gpc is disabled (CVE-2008-5919).
  • Bas van Schaik reported that listing.php does not properly enforce access restrictions when using an SVN authz file to authenticate users (CVE-2009-0240).

Impact

A remote attacker can exploit these vulnerabilities to overwrite arbitrary files, to read changelogs or diffs for restricted projects and to hijack a user's session.

Workaround

There is no known workaround at this time.

Resolution

All WebSVN users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/websvn-2.1.0"

References

Release date
March 09, 2009

Latest revision
March 09, 2009: 01

Severity
normal

Exploitable
remote

Bugzilla entries