CVE-2024-45720 – Apache Subversion: Command line argument injection on Windows platforms
https://notcve.org/view.php?id=CVE-2024-45720
On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed. All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue. Subversion is not affected on UNIX-like platforms. • https://subversion.apache.org/security/CVE-2024-45720-advisory.txt • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2022-24070 – Apache Subversion mod_dav_svn is vulnerable to memory corruption
https://notcve.org/view.php?id=CVE-2022-24070
Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected. La función mod_dav_svn de Subversion es vulnerable a una corrupción de memoria. • http://seclists.org/fulldisclosure/2022/Jul/18 https://bz.apache.org/bugzilla/show_bug.cgi?id=65861 https://cwiki.apache.org/confluence/display/HTTPD/ModuleLife https://issues.apache.org/jira/browse/SVN-4880 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT https://support.apple.com/kb/HT213345 https://www.debian • CWE-416: Use After Free •
CVE-2021-28544 – Apache Subversion SVN authz protected copyfrom paths regression
https://notcve.org/view.php?id=CVE-2021-28544
Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal 'copyfrom' paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the 'copyfrom' path of the original. This also reveals the fact that the node was copied. Only the 'copyfrom' path is revealed; not its contents. Both httpd and svnserve servers are vulnerable. • http://seclists.org/fulldisclosure/2022/Jul/18 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT https://subversion.apache.org/security/CVE-2021-28544-advisory.txt https://support.apple.com/kb/HT213345 https://www.debian.org/security/2022/dsa-5119 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2020-17525 – Remote unauthenticated denial-of-service in Subversion mod_authz_svn
https://notcve.org/view.php?id=CVE-2020-17525
Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7 El módulo mod_authz_svn de Subversion se bloqueará si el servidor está usando reglas de autenticación en el repositorio con la opción AuthzSVNReposRelativeAccessFile y un cliente envía una petición para una URL de repositorio no existente. Esto puede causar interrupciones para los usuarios del servicio. Este problema se solucionó en los servidores mod_dav_svn+mod_authz_svn versión 1.14.1 y los servidores mod_dav_svn+mod_authz_svn versión 1.10.7 A null-pointer-dereference flaw was found in mod_authz_svn of subversion. • https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html https://subversion.apache.org/security/CVE-2020-17525-advisory.txt https://access.redhat.com/security/cve/CVE-2020-17525 https://bugzilla.redhat.com/show_bug.cgi?id=1922303 • CWE-416: Use After Free CWE-476: NULL Pointer Dereference •
CVE-2018-11782 – subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev'
https://notcve.org/view.php?id=CVE-2018-11782
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server. En Apache Subversion versiones hasta 1.9.10, 1.10.4, 1.12.0 incluyéndolas, el proceso del servidor svnserve de Subversion puede cerrarse cuando una petición de solo lectura bien formada produce una respuesta en particular. Esto puede conllevar a interrupciones para usuarios del servidor. • http://subversion.apache.org/security/CVE-2018-11782-advisory.txt https://access.redhat.com/security/cve/CVE-2018-11782 https://bugzilla.redhat.com/show_bug.cgi?id=1733088 • CWE-20: Improper Input Validation CWE-617: Reachable Assertion •