[manjaro-security] [arch-security] [ASA-201608-11] websvn: cross-site scripting

Remi Gacogne rgacogne at archlinux.org
Thu Aug 11 13:11:22 CEST 2016


Arch Linux Security Advisory ASA-201608-11
==========================================

Severity: Medium
Date    : 2016-08-11
CVE-ID  : CVE-2016-1236
Package : websvn
Type    : cross-site scripting
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package websvn before version 2.3.3-7 is vulnerable to several
cross-site scripting issues.

Resolution
==========

Upgrade to 2.3.3-7.

# pacman -Syu "websvn>=2.3.3-7"

The problem has not been fixed upstream yet.

Workaround
==========

None.

Description
===========

Multiple cross-site scripting (XSS) vulnerabilities in revision.php,
log.php, listing.php, and comp.php in WebSVN allow context-dependent
attackers to inject arbitrary web script or HTML via the name of a file
or directory in a repository.

Impact
======

A remote attacker can execute arbitrary javascript code in the victim's
browser by creating a file or a directory with a specially crafted name
in a SVN repository.

References
==========

https://bugs.archlinux.org/task/50344
http://www.openwall.com/lists/oss-security/2016/05/05/22
https://access.redhat.com/security/cve/CVE-2016-1236

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20160811/30d79d1e/attachment.pgp>


More information about the manjaro-security mailing list