CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
74.9%
The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | subversion | 1.5.0 | cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:* |
apache | subversion | 1.5.1 | cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:* |
apache | subversion | 1.5.2 | cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:* |
apache | subversion | 1.5.3 | cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:* |
apache | subversion | 1.5.4 | cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:* |
apache | subversion | 1.5.5 | cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:* |
apache | subversion | 1.5.6 | cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:* |
apache | subversion | 1.5.7 | cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:* |
apache | subversion | 1.5.8 | cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:* |
apache | subversion | 1.6.0 | cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:* |
lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
lists.opensuse.org/opensuse-updates/2015-04/msg00008.html
rhn.redhat.com/errata/RHSA-2015-1633.html
rhn.redhat.com/errata/RHSA-2015-1742.html
seclists.org/fulldisclosure/2015/Jun/32
subversion.apache.org/security/CVE-2015-0251-advisory.txt
www.debian.org/security/2015/dsa-3231
www.mandriva.com/security/advisories?name=MDVSA-2015:192
www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
www.securityfocus.com/bid/74259
www.securitytracker.com/id/1033214
www.ubuntu.com/usn/USN-2721-1
security.gentoo.org/glsa/201610-05
support.apple.com/HT205217