Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Subversion: Vulnerability in mod_authz_svn
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200407-20
(Subversion: Vulnerability in mod_authz_svn)
Users with write access to part of a Subversion repository may bypass read
restrictions on any part of that repository. This can be done using an
"svn copy" command to copy the portion of a repository the user
wishes to read into an area where they have write access.
Since copies are versioned, any such copy attempts will be readily
This is a low-risk vulnerability. It affects only users of Subversion who
are running servers inside Apache and using mod_authz_svn. Additionally,
this vulnerability may be exploited only by users with write access to some
portion of a repository.
Keep sensitive content separated into different Subversion repositories, or
disable the Apache Subversion server and use svnserve instead.
All Subversion users should upgrade to the latest available version:
# emerge sync
# emerge -pv ">=dev-util/subversion-1.0.6"
# emerve ">=dev-util/subversion-1.0.6"
Network Security Threat Level: Low
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|Lenovo Yoga Book 10” Touch 2-in-1 x5-Z8550 4GB/64GB YB1-X90F Tablet Grey Android
|LENOVO THINKSERVER RD450 E5-2650V3 2.3GHZ 32GB 2133MHZ LRDIMM 500GB SATA
|LENOVO THINKSERVER RD650 E5-2620V4 2.1GHZ 64GB NO HDD
|IBM SYSTEM X3650 M4 2.5 SERVER TWO E5-2630V2 2.60GHZ 192GB 2 X 146GB 15K SAS M51
No Discussions have been posted on this vulnerability.