Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Subversion: Vulnerability in mod_authz_svn
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200407-20
(Subversion: Vulnerability in mod_authz_svn)
Users with write access to part of a Subversion repository may bypass read
restrictions on any part of that repository. This can be done using an
"svn copy" command to copy the portion of a repository the user
wishes to read into an area where they have write access.
Since copies are versioned, any such copy attempts will be readily
This is a low-risk vulnerability. It affects only users of Subversion who
are running servers inside Apache and using mod_authz_svn. Additionally,
this vulnerability may be exploited only by users with write access to some
portion of a repository.
Keep sensitive content separated into different Subversion repositories, or
disable the Apache Subversion server and use svnserve instead.
All Subversion users should upgrade to the latest available version:
# emerge sync
# emerge -pv ">=dev-util/subversion-1.0.6"
# emerve ">=dev-util/subversion-1.0.6"
Network Security Threat Level: Low
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|Blue GPU CPU Heatsink Cooling Thermal Conductive Silicone Pad 100x100x0.5mm PX
|7 Inch HD Tablet PC, Android 5.1, Wi-Fi, 16GB SD, Google Play, White, Quad CPU
|Teclast X10, 10.1 Inch IPS FHD Screen, 3G Android Tablet, Quad Core CPU, WiFi
|Computer parts, video cards, processor, router, network switch..
No Discussions have been posted on this vulnerability.