Show plain JSON{"id": "CVE-2008-5919", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2009-01-21T02:30:00.267", "references": [{"url": "http://secunia.com/advisories/32338", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/34191", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/4928", "source": "cve@mitre.org"}, {"url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179", "source": "cve@mitre.org"}, {"url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml", "source": "cve@mitre.org"}, {"url": "http://www.gulftech.org/?node=research&article_id=00132-10202008", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/31891", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/6822", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/32338", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/34191", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/4928", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://websvn.tigris.org/issues/show_bug.cgi?id=179", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://websvn.tigris.org/servlets/NewsItemView?newsItemID=2218", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.gulftech.org/?node=research&article_id=00132-10202008", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/31891", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46050", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/6822", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en rss.php en WebSVN v2.0 y anteriores, cuando magic_quotes_gpc est\u00e1 deshabilitado, permite a atacantes remotos sobrescribir ficheros de su elecci\u00f3n a trav\u00e9s de secuencias de salto de directorio en el par\u00e1metro \"rev\"."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:tigris:websvn:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5C51792-F7E8-4847-ADDA-50065DD8ADCD", "versionEndIncluding": "2.0"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5184AC02-1F9D-4986-A08A-837A9CCA79D5"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE26E8A6-A516-4D1D-894D-E23AABA51A7F"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFDC8A10-08EB-4444-8771-4493E491DD21"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93B1AFDE-3DF3-4F9D-B6C9-54AD7F1F056C"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F420EE5-22E2-42B7-A906-EA9FEC4053DC"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31688948-CC90-46AA-AB3A-B66B88E465FE"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDBFBAEE-7B71-4D40-ACA1-BCFC889C0D04"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.31a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E889518B-485B-4CD3-996B-7198DFBAD805"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.32:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "648D1220-2387-497E-BBAE-82D43903754A"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.33:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AAF04A7-4D3C-4A56-99BA-3075D59DA136"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FF1A838-B8B8-4395-9317-8A6A2552C2D1"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.37:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E28A169D-4C20-42A5-9947-D996710D5705"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.38:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8BE03BE-1122-4A78-9E7C-9ADA01DCD8C0"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.39:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AEFAEA8-7A6E-430A-87DD-C6C9C55D5ABF"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.40:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07CF6D7C-8F68-47F3-BD5B-0720B33EB89D"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.51:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BC5AAC1-6110-4282-824C-6A660BEC5517"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.60:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C26622F-C77F-42AB-AA6A-F13B3A12DB7D"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.61:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D0152F8-71BA-4C7D-A8A1-72340B6924C4"}, {"criteria": "cpe:2.3:a:tigris:websvn:1.62:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58024D23-C2D7-42E9-B0A2-7F774939241A"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}