// For flags

CVE-2019-14422

TortoiseSVN 1.12.1 - Remote Code Execution

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in in TortoiseSVN 1.12.1. The Tsvncmd: URI handler allows a customised diff operation on Excel workbooks, which could be used to open remote workbooks without protection from macro security settings to execute arbitrary code. A tsvncmd:command:diff?path:[file1]?path2:[file2] URI will execute a customised diff on [file1] and [file2] based on the file extension. For xls files, it will execute the script diff-xls.js using wscript, which will open the two files for analysis without any macro security warning. An attacker can exploit this by putting a macro virus in a network drive, and force the victim to open the workbooks and execute the macro inside.

Se detectó un problema en TortoiseSVN versión 1.12.1. El manejador del URI Tsvncmd: permite una operación diff personalizada en los libros de trabajo de Excel, que podría ser usado para abrir libros de trabajo remotos sin protección de la configuración de seguridad de macros para ejecutar código arbitrario. Un URI tsvncmd:command:diff?path:[file1]?path2:[file2] ejecutará un diff personalizada en [file1] y [file2] en base de la extensión del archivo. Para los archivos xls, se ejecutará el script diff-xls.js usando wscript, que abrirá los dos archivos para su análisis sin ninguna advertencia de seguridad de macro. Un atacante puede explotar esto colocando un virus macro en una unidad de red y forzando a la víctima a abrir los libros de trabajo y ejecutar la macro en su interior.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-29 CVE Reserved
  • 2019-08-14 First Exploit
  • 2019-08-15 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-10-01 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tortoisesvn
Search vendor "Tortoisesvn"
Tortoisesvn
Search vendor "Tortoisesvn" for product "Tortoisesvn"
1.12.1
Search vendor "Tortoisesvn" for product "Tortoisesvn" and version "1.12.1"
-
Affected