CVE-2017-9800
11.08.2017, 21:29
A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.Enginsight
Vendor | Product | Version |
---|---|---|
apache | subversion | 𝑥 ≤ 1.8.18 |
apache | subversion | 1.9.0 |
apache | subversion | 1.9.1 |
apache | subversion | 1.9.2 |
apache | subversion | 1.9.3 |
apache | subversion | 1.9.4 |
apache | subversion | 1.9.5 |
apache | subversion | 1.9.6 |
apache | subversion | 1.10.0 |
apache | subversion | 1.10.0:alpha1 |
apache | subversion | 1.10.0:alpha2 |
apache | subversion | 1.10.0:alpha3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration