Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Subversion: Vulnerability in mod_authz_svn
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200407-20
(Subversion: Vulnerability in mod_authz_svn)
Users with write access to part of a Subversion repository may bypass read
restrictions on any part of that repository. This can be done using an
"svn copy" command to copy the portion of a repository the user
wishes to read into an area where they have write access.
Since copies are versioned, any such copy attempts will be readily
This is a low-risk vulnerability. It affects only users of Subversion who
are running servers inside Apache and using mod_authz_svn. Additionally,
this vulnerability may be exploited only by users with write access to some
portion of a repository.
Keep sensitive content separated into different Subversion repositories, or
disable the Apache Subversion server and use svnserve instead.
All Subversion users should upgrade to the latest available version:
# emerge sync
# emerge -pv ">=dev-util/subversion-1.0.6"
# emerve ">=dev-util/subversion-1.0.6"
Network Security Threat Level: Low
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|64GB (8x 8GB) Hynix HMT31GR7CFR4C-PB PC3-12800R DDR3 REG ECC Server Memory
|DELL PowerEdge 28Cores R730XD Server 2 X E5-2697 V3 2.6GHZ 192GB Ram 6 x 8TB
|Kingston 8GB PC2-5300F DDR2 2Rx4 DIMM Server RAM Memory KTM5780/16G
|Dell PowerEdge R630 Server, 2x E5-2680 V3 2.5GHz 12Core, 256GB, 2x 1TB, H730
No Discussions have been posted on this vulnerability.