WebSVN "log.php" Cross-Site Scripting Vulnerability


Description   (:A cross-site scripting vulnerability was reported in WebSVN.:A remote attacker could exploit it by enticing their victim into following a specially crafted link in order to execute arbitrary HTML/JavaScript code.::This vulnerability is located in the "path" parameter of the "log.php" script page.::A proof of concept is available.)
     
Vulnerable Products   Vulnerable OS:
Fedora (Red Hat) - 22, 23FreeBSD (FreeBSD) - AllGNU/Linux (Debian) - 6, 7, 8
     
Solution   Fixed websvn packages for Fedora 23 are available.
     
CVE   CVE-2016-2511
     
References   - FullDisclosure : Vulnerability in WebSVN 2.3.3
http://seclists.org/fulldisclosure/2016/Feb/99
- DLA 428-1 : websvn security update
https://lists.debian.org/debian-lts-announce/2016/02/msg00020.html
- DSA 3490-1 : websvn security update
https://lists.debian.org/debian-security-announce/2016/msg00060.html
- VuXML : websvn -- reflected cross-site scripting
http://www.vuxml.org/freebsd/12d1b5a6-e39d-11e5-9f77-5453ed2e2b49.html
- FEDORA-2016-11537160e9 : Fedora 22 Update: websvn-2.3.3-12.fc22
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/179118.html
- FEDORA-2016-657a1305aa : Fedora 23 Update: websvn-2.3.3-12.fc23
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/179168.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2016-02-22 

 Target Type 
Server 

 Possible exploit 
Remote