Executive Summary

Informations
Name CVE-2024-46901 First vendor Publication 2024-12-09
Vendor Cve Last vendor Modification 2025-07-15

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Overall CVSS Score 4.3
Base Score 4.3 Environmental Score 4.3
impact SubScore 1.4 Temporal Score 4.3
Exploitabality Sub Score 2.8
 
Attack Vector Network Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact Low
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.

All versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.

Repositories served via other access methods are not affected.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46901

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 174
Os 1

Sources (Detail)

https://lists.debian.org/debian-lts-announce/2025/04/msg00023.html
https://subversion.apache.org/security/CVE-2024-46901-advisory.txt
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2025-07-15 21:21:21
  • Multiple Updates
2025-05-27 02:44:11
  • Multiple Updates
2024-12-09 13:20:32
  • First insertion