9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.956 High
EPSS
Percentile
99.4%
Severity: High
Date : 2021-05-25
CVE-ID : CVE-2021-32305
Package : websvn
Type : arbitrary command execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1969
The package websvn before version 2.6.1-1 is vulnerable to arbitrary
command execution.
Upgrade to 2.6.1-1.
The problem has been fixed upstream in version 2.6.1.
None.
WebSVN before 2.6.1 allows remote attackers to execute arbitrary
commands via shell metacharacters in the search parameter.
A remote attacker can execute arbitrary shell commands on the server
using a crafted search query.
https://github.com/websvnphp/websvn/pull/142
https://github.com/websvnphp/websvn/commit/88fce56b7b9dbfc0fe2629217c3bff2c2e751920
https://security.archlinux.org/CVE-2021-32305
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.956 High
EPSS
Percentile
99.4%