CVE-2010-3315
Published Oct 4, 2010
Last updated 7 years ago
Overview
- Description
- authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 6.4
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-16
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3" }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303" }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F" }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E" }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3" }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F" }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280" }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5" }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0" } ], "operator": "OR" } ] } ]