Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-32305 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Remote Command Injection in WebSVN. πŸ“‰ **Consequences**: Attackers can execute arbitrary OS commands via the search parameter. πŸ’₯ **Impact**: Full system compromise via shell metacharacters.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-78 (OS Command Injection). πŸ” **Flaw**: Lack of input sanitization in the `search.php` parameter. ⚠️ **Root**: Shell metacharacters are passed directly to the OS.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: WebSVN (Online Subversion Repository Browser). πŸ“… **Affected**: Versions **before 2.6.1**. 🚫 **Fixed**: Version 2.6.1 and later.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Runs with the web server's privileges (e.g., `www-data`). πŸ’Ύ **Data**: Can read/write files, steal repo data, or pivot to internal networks. πŸ–₯️ **Action**: Full remote code execution (RCE).

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Auth**: Likely **Low/None**. The search function is often public. 🌐 **Access**: Remote attackers can trigger it via HTTP requests. 🎯 **Ease**: Simple payload injection.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exp**: **Yes**. Multiple PoCs exist on GitHub (e.g., `CVE-2021-32305.py`). πŸš€ **Wild Exp**: High risk. Nuclei templates available for mass scanning. πŸ“œ **Proof**: Reverse shell payloads demonstrated.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for `search.php` with shell metacharacters (e.g., `;`, `|`, `&`). πŸ“‘ **Tool**: Use Nuclei or Burp Suite to test injection. 🏷️ **Indicator**: Look for WebSVN version < 2.6.1.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. Upgrade to **WebSVN 2.6.1**. πŸ“₯ **Patch**: Pull request #142 merged into official repo. πŸ”„ **Action**: Immediate update recommended.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Workaround**: If unpatchable, restrict access to `search.php` via WAF or firewall. 🚫 **Block**: Filter shell metacharacters in input parameters. 🧱 **Isolate**: Limit web server permissions to minimize damage.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL**. 🚨 **Urgency**: High. RCE allows immediate takeover. ⏳ **Time**: Patch immediately. No auth needed makes it easy to exploit.