vulnerability
Oracle Linux: CVE-2017-9800: ELSA-2017-2480: subversion security update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | 2017-08-10 | 2017-08-16 | 2024-11-29 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
2017-08-10
Added
2017-08-16
Modified
2024-11-29
Description
A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.
A shell command injection flaw related to the handling of "svn+ssh" URLs has been discovered in Subversion. An attacker could use this flaw to execute shell commands with the privileges of the user running the Subversion client, for example when performing a "checkout" or "update" action on a malicious repository, or a legitimate repository containing a malicious commit.
A shell command injection flaw related to the handling of "svn+ssh" URLs has been discovered in Subversion. An attacker could use this flaw to execute shell commands with the privileges of the user running the Subversion client, for example when performing a "checkout" or "update" action on a malicious repository, or a legitimate repository containing a malicious commit.
Solution(s)
oracle-linux-upgrade-mod-dav-svnoracle-linux-upgrade-subversionoracle-linux-upgrade-subversion-develoracle-linux-upgrade-subversion-gnomeoracle-linux-upgrade-subversion-javahloracle-linux-upgrade-subversion-kdeoracle-linux-upgrade-subversion-libsoracle-linux-upgrade-subversion-perloracle-linux-upgrade-subversion-pythonoracle-linux-upgrade-subversion-rubyoracle-linux-upgrade-subversion-tools

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.