Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Remote file access >> Subversion Module unreadeable path information disclosure


Vulnerability Assessment Details

Subversion Module unreadeable path information disclosure

Vulnerability Assessment Summary
Check for Subversion version

Detailed Explanation for this Vulnerability Assessment

You are running a version of Subversion which is older than 1.0.8 or
1.1.0-rc4.

A flaw exist in older version, in the apache module mod_authz_svn,
which fails to properly restrict access to metadata within unreadable
paths.

A possible hacker can read metadata in unreadable paths, which can contain
sensitive information such as logs and paths.

Solution : Upgrade to subversion 1.0.8, 1.1.0-rc4 or newer
Network Security Threat Level: Medium

Networks Security ID: 11243

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak

Cables, Connectors

Dell PowerEdge R420 2x E5-2450 2.1GHz 8-Core 16GB 4x 1TB 7.2K SAS PERC H310
$1475.0
Dell PowerEdge R420 2x E5-2450 2.1GHz 8-Core 16GB 4x 1TB 7.2K SAS PERC H310 pictureDell PowerEdge R410 2x Intel Xeon E5620 2.4GHz 16GB RAM 500GB LOCAL PICKUP
$29.99
Dell PowerEdge R410 2x Intel Xeon E5620 2.4GHz 16GB RAM 500GB  LOCAL PICKUP pictureDell PowerEdge R420 2x E5-2450 2.1GHz 8-Core 16GB 4x 3TB 7.2K SAS PERC H310
$1600.0
Dell PowerEdge R420 2x E5-2450 2.1GHz 8-Core 16GB 4x 3TB 7.2K SAS PERC H310 pictureDell PowerEdge R620 H310 Mini 2x E5-2620 2.00GHz 24GB NO HD
$249.99
Dell PowerEdge R620 H310 Mini 2x E5-2620 2.00GHz 24GB NO HD  picture


Discussions

No Discussions have been posted on this vulnerability.