This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Apache First view 2015-08-12
Product Subversion Last view 2024-10-09
Version 1.8.13 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:apache:subversion

Activity : Overall

Related : CVE

  Date Alert Description
7.8 2024-10-09 CVE-2024-45720

On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.

All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.

Subversion is not affected on UNIX-like platforms.

7.5 2022-04-12 CVE-2022-24070

Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected.

4.3 2022-04-12 CVE-2021-28544

Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal 'copyfrom' paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the 'copyfrom' path of the original. This also reveals the fact that the node was copied. Only the 'copyfrom' path is revealed; not its contents. Both httpd and svnserve servers are vulnerable.

7.5 2021-03-17 CVE-2020-17525

Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7

7.5 2019-09-26 CVE-2019-0203

In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server.

6.5 2019-09-26 CVE-2018-11782

In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.

7.5 2019-02-05 CVE-2018-11803

Subversion's mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation.

6.5 2017-10-16 CVE-2016-8734

Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.

9.8 2017-08-11 CVE-2017-9800

A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.

6.5 2016-05-05 CVE-2016-2168

The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.

6.8 2016-05-05 CVE-2016-2167

The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.

7.6 2016-04-14 CVE-2015-5343

Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.

4 2015-08-12 CVE-2015-3187

The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.

CWE : Common Weakness Enumeration

%idName
18% (2) CWE-476 NULL Pointer Dereference
18% (2) CWE-200 Information Exposure
18% (2) CWE-20 Improper Input Validation
9% (1) CWE-755 Improper Handling of Exceptional Conditions
9% (1) CWE-416 Use After Free
9% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
9% (1) CWE-284 Access Control (Authorization) Issues
9% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

Snort® IPS/IDS

Date Description
2014-01-10 HTTP request with negative Content-Length attempt
RuleID : 2278-community - Type : SERVER-WEBAPP - Revision : 34
2014-01-10 HTTP request with negative Content-Length attempt
RuleID : 2278 - Type : SERVER-WEBAPP - Revision : 33

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-09-06 Name: The remote Debian host is missing a security update.
File: debian_DLA-1495.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2017-1_0-0093.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2017-0031.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2016-0013.nasl - Type: ACT_GATHER_INFO
2017-10-30 Name: The remote Debian host is missing a security update.
File: debian_DLA-1144.nasl - Type: ACT_GATHER_INFO
2017-09-20 Name: An IDE application installed on the remote macOS or Mac OS X host is affected...
File: macosx_xcode_9.nasl - Type: ACT_GATHER_INFO
2017-09-18 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201709-09.nasl - Type: ACT_GATHER_INFO
2017-09-08 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2017-1176.nasl - Type: ACT_GATHER_INFO
2017-09-08 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2017-1175.nasl - Type: ACT_GATHER_INFO
2017-09-01 Name: The remote Debian host is missing a security update.
File: debian_DLA-1072.nasl - Type: ACT_GATHER_INFO
2017-09-01 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2017-883.nasl - Type: ACT_GATHER_INFO
2017-08-25 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2017-2480.nasl - Type: ACT_GATHER_INFO
2017-08-24 Name: The remote Fedora host is missing a security update.
File: fedora_2017-1d1a38bdd1.nasl - Type: ACT_GATHER_INFO
2017-08-22 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20170816_subversion_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2017-08-18 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-940.nasl - Type: ACT_GATHER_INFO
2017-08-16 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-2480.nasl - Type: ACT_GATHER_INFO
2017-08-16 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2017-2480.nasl - Type: ACT_GATHER_INFO
2017-08-15 Name: The remote Fedora host is missing a security update.
File: fedora_2017-951b6a78d4.nasl - Type: ACT_GATHER_INFO
2017-08-14 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_6e80bd9b7e9b11e7abfe90e2baa3bafc.nasl - Type: ACT_GATHER_INFO
2017-08-14 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_1d33cdee7f6b11e7a9b53debb10a6871.nasl - Type: ACT_GATHER_INFO
2017-08-14 Name: The remote Debian host is missing a security update.
File: debian_DLA-1052.nasl - Type: ACT_GATHER_INFO
2017-08-14 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2017-223-04.nasl - Type: ACT_GATHER_INFO
2017-08-11 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3388-1.nasl - Type: ACT_GATHER_INFO
2017-08-11 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3932.nasl - Type: ACT_GATHER_INFO
2017-02-07 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2017-794.nasl - Type: ACT_GATHER_INFO