Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Subversion: Vulnerability in mod_authz_svn
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200407-20
(Subversion: Vulnerability in mod_authz_svn)
Users with write access to part of a Subversion repository may bypass read
restrictions on any part of that repository. This can be done using an
"svn copy" command to copy the portion of a repository the user
wishes to read into an area where they have write access.
Since copies are versioned, any such copy attempts will be readily
This is a low-risk vulnerability. It affects only users of Subversion who
are running servers inside Apache and using mod_authz_svn. Additionally,
this vulnerability may be exploited only by users with write access to some
portion of a repository.
Keep sensitive content separated into different Subversion repositories, or
disable the Apache Subversion server and use svnserve instead.
All Subversion users should upgrade to the latest available version:
# emerge sync
# emerge -pv ">=dev-util/subversion-1.0.6"
# emerve ">=dev-util/subversion-1.0.6"
Network Security Threat Level: Low
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|Cisco Small Bus. 24-Port GB Managed PoE Switch w/ 4-Port 10GB SFP *Fact. Reset*
|White Rock Networks OC-48 x1 LR 1550 SFP 38-1001944-0310 WR-P048E-L01-55000
|GLC-SX-MM (Lot of 40) 1000BASE-SX SFP Trans Module class 1 laser 21CFR for CISCO
|Lot of (15) NHR SFP GE S LC Optical Transceiver SFP--SR-NHR
No Discussions have been posted on this vulnerability.