Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:tigris:websvn:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "5184AC02-1F9D-4986-A08A-837A9CCA79D5", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "AE26E8A6-A516-4D1D-894D-E23AABA51A7F", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "BFDC8A10-08EB-4444-8771-4493E491DD21", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "93B1AFDE-3DF3-4F9D-B6C9-54AD7F1F056C", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "9F420EE5-22E2-42B7-A906-EA9FEC4053DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "31688948-CC90-46AA-AB3A-B66B88E465FE", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.20:*:*:*:*:*:*:*", "matchCriteriaId": "EDBFBAEE-7B71-4D40-ACA1-BCFC889C0D04", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.31a:*:*:*:*:*:*:*", "matchCriteriaId": "E889518B-485B-4CD3-996B-7198DFBAD805", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.32:*:*:*:*:*:*:*", "matchCriteriaId": "648D1220-2387-497E-BBAE-82D43903754A", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.33:*:*:*:*:*:*:*", "matchCriteriaId": "0AAF04A7-4D3C-4A56-99BA-3075D59DA136", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.34:*:*:*:*:*:*:*", "matchCriteriaId": "3FF1A838-B8B8-4395-9317-8A6A2552C2D1", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.37:*:*:*:*:*:*:*", "matchCriteriaId": "E28A169D-4C20-42A5-9947-D996710D5705", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.38:*:*:*:*:*:*:*", "matchCriteriaId": "A8BE03BE-1122-4A78-9E7C-9ADA01DCD8C0", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.39:*:*:*:*:*:*:*", "matchCriteriaId": "4AEFAEA8-7A6E-430A-87DD-C6C9C55D5ABF", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.40:*:*:*:*:*:*:*", "matchCriteriaId": "07CF6D7C-8F68-47F3-BD5B-0720B33EB89D", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "0BC5AAC1-6110-4282-824C-6A660BEC5517", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.60:*:*:*:*:*:*:*", "matchCriteriaId": "8C26622F-C77F-42AB-AA6A-F13B3A12DB7D", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.61:*:*:*:*:*:*:*", "matchCriteriaId": "4D0152F8-71BA-4C7D-A8A1-72340B6924C4", "vulnerable": true}, {"criteria": "cpe:2.3:a:tigris:websvn:1.62:*:*:*:*:*:*:*", "matchCriteriaId": "58024D23-C2D7-42E9-B0A2-7F774939241A", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch."}, {"lang": "es", "value": "La funci\u00f3n create_anchors en utils.inc en WebSVN v1.x permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de nombres de usuario manipulados que es procesado por la funci\u00f3n preg_replace con el switch \"eval\"."}], "evaluatorSolution": "Patch information - http://websvn.tigris.org/", "id": "CVE-2008-5920", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2009-01-21T02:30:00.297", "references": [{"source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4928"}, {"source": "cve@mitre.org", "url": "http://www.gulftech.org/?node=research&article_id=00132-10202008"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/31891"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"}, {"source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/6822"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4928"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gulftech.org/?node=research&article_id=00132-10202008"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/31891"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6822"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-94"}], "source": "nvd@nist.gov", "type": "Primary"}]}