CPANSA-Alien-SVN-2017-9800-svn: Alien-SVN vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2017-08-11T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2017-08-11T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | 9.8 | Severity | Critical |
Original language | Language | en | |
Also referred to |
Vulnerability Description
A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.
Vulnerabilities
CVE-2017-9800
Vulnerability DescriptionA maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.
Weakness | CWE-20 : Improper Input Validation |
---|
Product status
Known affected
Product | Score | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Alien-SVN equal =1.8.11.0 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Alien-SVN-2017-9800-svn JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2017/cpansa-alien-svn-2017-9800-svn.json - https://subversion.apache.org/security/CVE-2017-9800-advisory.txt external
https://subversion.apache.org/security/CVE-2017-9800-advisory.txt - https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63@%3Cannounce.apache.org%3E external
https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63@%3Cannounce.apache.org%3E - http://www.securitytracker.com/id/1039127 external
http://www.securitytracker.com/id/1039127 - http://www.securityfocus.com/bid/100259 external
http://www.securityfocus.com/bid/100259 - https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html external
https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html - http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html external
http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html - https://security.gentoo.org/glsa/201709-09 external
https://security.gentoo.org/glsa/201709-09 - https://support.apple.com/HT208103 external
https://support.apple.com/HT208103 - http://www.debian.org/security/2017/dsa-3932 external
http://www.debian.org/security/2017/dsa-3932 - https://access.redhat.com/errata/RHSA-2017:2480 external
https://access.redhat.com/errata/RHSA-2017:2480 - http://www.securityfocus.com/archive/1/540999/100/0/threaded external
http://www.securityfocus.com/archive/1/540999/100/0/threaded - https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76@%3Ccommits.subversion.apache.org%3E external
https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76@%3Ccommits.subversion.apache.org%3E - https://www.oracle.com/security-alerts/cpuoct2020.html external
https://www.oracle.com/security-alerts/cpuoct2020.html - CVE-2017-9800 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2017-9800
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Fri Aug 11 00:00:00 2017 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/