Vulnerability Description
The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tigris | Websvn | 1.00 |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/4928
- http://www.gulftech.org/?node=research&article_id=00132-10202008
- http://www.securityfocus.com/bid/31891Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48168
- https://www.exploit-db.com/exploits/6822
- http://securityreason.com/securityalert/4928
- http://www.gulftech.org/?node=research&article_id=00132-10202008
- http://www.securityfocus.com/bid/31891Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48168
- https://www.exploit-db.com/exploits/6822
FAQ
What is CVE-2008-5920?
CVE-2008-5920 is a vulnerability with a CVSS score of 7.5 (HIGH). The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch.
How severe is CVE-2008-5920?
CVE-2008-5920 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5920?
Check the references section above for vendor advisories and patch information. Affected products include: Tigris Websvn.