WebSVN 2.3.3 allows remote authenticated users to read arbitrary files via a symlink attack in a commit.
References
Link | Resource |
---|---|
http://secunia.com/advisories/62233 | |
http://www.debian.org/security/2015/dsa-3137 | Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775682 | Issue Tracking Third Party Advisory |
http://secunia.com/advisories/62233 | |
http://www.debian.org/security/2015/dsa-3137 | Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775682 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/62233 - | |
References | () http://www.debian.org/security/2015/dsa-3137 - Third Party Advisory | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775682 - Issue Tracking, Third Party Advisory |
Information
Published : 2015-01-21 18:59
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6892
Mitre link : CVE-2013-6892
CVE.ORG link : CVE-2013-6892
JSON object : View
Products Affected
debian
- debian_linux
websvn
- websvn
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor