CVE-2017-9800

A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
apacheCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
apachesubversion
𝑥
≤ 1.8.18
apachesubversion
1.9.0
apachesubversion
1.9.1
apachesubversion
1.9.2
apachesubversion
1.9.3
apachesubversion
1.9.4
apachesubversion
1.9.5
apachesubversion
1.9.6
apachesubversion
1.10.0
apachesubversion
1.10.0:alpha1
apachesubversion
1.10.0:alpha2
apachesubversion
1.10.0:alpha3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
subversion
bullseye (security)
1.14.1-3+deb11u1
fixed
bullseye
1.14.1-3+deb11u1
fixed
bookworm
1.14.2-4
fixed
sid
1.14.4-2
fixed
trixie
1.14.4-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
subversion
artful
not-affected
zesty
Fixed 1.9.5-1ubuntu1.1
released
xenial
Fixed 1.9.3-2ubuntu1.1
released
trusty
Fixed 1.8.8-1ubuntu3.3
released
References