vulnerability

FreeBSD: VID-6E80BD9B-7E9B-11E7-ABFE-90E2BAA3BAFC: subversion -- Arbitrary code execution vulnerability

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Aug 10, 2017
Added
Aug 11, 2017
Modified
Feb 19, 2025

Description



subversion team reports:



A Subversion client sometimes connects to URLs provided by the repository.


This happens in two primary cases: during 'checkout', 'export', 'update', and


'switch', when the tree being downloaded contains svn:externals properties;


and when using 'svnsync sync' with one URL argument.


A maliciously constructed svn+ssh:// URL would cause Subversion clients to


run an arbitrary shell command. Such a URL could be generated by a malicious


server, by a malicious user committing to a honest server (to attack another


user of that server's repositories), or by a proxy server.


The vulnerability affects all clients, including those that use file://,


http://, and plain (untunneled) svn://.


An exploit has been tested.




Solution(s)

freebsd-upgrade-package-subversionfreebsd-upgrade-package-subversion-staticfreebsd-upgrade-package-subversion18

References

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.