CVE-2004-1438
CVSS2.1
发布时间 :2004-12-31 00:00:00
修订时间 :2008-09-10 15:30:19
NMCOS    

[原文]The mod_authz_svn Apache module for Subversion 1.0.4-r1 and earlier allows remote authenticated users, with write access to the repository, to read unauthorized parts of the repository via the svn copy command.


[CNNVD]Subversion mod_authz_svn验证用户查看受限资源漏洞(CNNVD-200412-203)

        
        Subversion是一款版本控制系统。
        Subversion包含的mod_authz_svn存在问题,远程攻击者可以利用这个漏洞读取访问原来被限制的资源内容。
        根据供应商公告,远程验证的拥有写访问权限的Subversion用户可通过调用mod_authz_svn拷贝资料库中的受限制内容,然后读取受限制的资源。
        此漏洞只存在于运行了mod_authz_svn (Apache模块)的站点。
        

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:subversion:subversion:1.0.3
cpe:/a:subversion:subversion:1.0.2
cpe:/a:subversion:subversion:1.0.4
cpe:/a:subversion:subversion:1.0.1
cpe:/a:subversion:subversion:1.0.5
cpe:/a:subversion:subversion:1.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1438
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1438
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-203
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/10800
(PATCH)  BID  10800
http://www.gentoo.org/security/en/glsa/glsa-200407-20.xml
(PATCH)  GENTOO  GLSA-200407-20
http://xforce.iss.net/xforce/xfdb/16803
(UNKNOWN)  XF  subversion-modauthzsvn-restriction-bypass(16803)
http://svn.collab.net/repos/svn/tags/1.0.6/CHANGES
(UNKNOWN)  CONFIRM  http://svn.collab.net/repos/svn/tags/1.0.6/CHANGES
http://securitytracker.com/id?1010779
(UNKNOWN)  SECTRACK  1010779
http://securityreason.com/securityalert/60
(UNKNOWN)  SREASON  60

- 漏洞信息

Subversion mod_authz_svn验证用户查看受限资源漏洞
低危 访问验证错误
2004-12-31 00:00:00 2005-10-20 00:00:00
远程  
        
        Subversion是一款版本控制系统。
        Subversion包含的mod_authz_svn存在问题,远程攻击者可以利用这个漏洞读取访问原来被限制的资源内容。
        根据供应商公告,远程验证的拥有写访问权限的Subversion用户可通过调用mod_authz_svn拷贝资料库中的受限制内容,然后读取受限制的资源。
        此漏洞只存在于运行了mod_authz_svn (Apache模块)的站点。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 关闭DAV及使用svnserve
        * 通过APACHE配置关闭COPY方法。
        厂商补丁:
        Subversion
        ----------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载升级程序到subversion1.0.6或1.1.0-rc1:
        
        http://subversion.tigris.org/project_packages.html

- 漏洞信息

8239
Subversion (SVN) mod_authz_svn Restricted File Access Bypass
Local Access Required Other
Loss of Confidentiality
Exploit Unknown

- 漏洞描述

Subversion contains a flaw that may allow a malicious user to gain unauthorized read access. The issue is due to Apache module "mod_authz_svn" allowing a user to copy portions from a read restricted repository to other portions . It is possible that the flaw may allow a local attacker to get the unauthorized information, resulting in a loss of confidentialit.

- 时间线

2004-07-26 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.0.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Subversion 'mod_authz_svn' Access Control Bypass Vulnerabilities
Access Validation Error 10800
Yes No
2004-07-26 12:00:00 2009-07-12 06:16:00
Ben Collins-Sussman reported these issues to the vendor.

- 受影响的程序版本

Subversion Subversion 1.0.5
Subversion Subversion 1.0.4
Subversion Subversion 1.0.3
Subversion Subversion 1.0.2
Subversion Subversion 1.0.1
+ Conectiva Linux 10.0
Subversion Subversion 1.0
Red Hat Fedora Core2
Gentoo Linux 1.4
Subversion Subversion 1.1 .0-rc1
Subversion Subversion 1.0.6

- 不受影响的程序版本

Subversion Subversion 1.1 .0-rc1
Subversion Subversion 1.0.6

- 漏洞讨论

Subversion is reported to contain access control bypass vulnerabilities in its 'mod_authz_svn' Apache module.

These access control vulnerabilities present themselves when users have mixed access to a repository.

These vulnerabilities exist in several server operations, such as COPY and DELETE. These operations fail to properly implement the operator assigned access controls, allowing users improper access to repositories.

These issues are only present when using the WebDAV access method with the Apache 'mod_authz_svn' module, with the 'AuthzSVNAccessFile' configuration directive.

The vulnerabilities are present in version 1.0.5 and prior. Versions 1.0.6 and 1.1.0-rc1 have been released to address these vulnerabilities.

- 漏洞利用

No exploit is required.

- 解决方案

The vendor has released version 1.0.6 and 1.1.0-rc1 that are immune to these issues.

RedHat Linux has released advisory FEDORA-2004-231 that addresses this issue for Fedore Core 2. Please see the referenced advisory for further information.

Gentoo Linux has released advisory GLSA 200407-20 addressing this issue. Please see the referenced advisory for further information. Users of affected packages are urged to execute the following with superuser privileges:
emerge sync
emerge -pv ">=dev-util/subversion-1.0.6"
emerge ">=dev-util/subversion-1.0.6"


Subversion Subversion 1.0

Subversion Subversion 1.0.1

Subversion Subversion 1.0.2

Subversion Subversion 1.0.3

Subversion Subversion 1.0.4

Subversion Subversion 1.0.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站