APP: Apache Subversion URL Command Execution

A command execution vulnerability exists in Apache Subversion. A remote attacker could exploit this vulnerability by enticing a user to checkout a malicious repository. Successful exploitation will allow the attacker to execute arbitrary commands under the security context of the current user.

Extended Description

A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.

Affected Products

Apache subversion

Short Name
APP:MISC:APACHE-SVN-CE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
APP
Keywords
Apache CVE-2017-9800 Command Execution Subversion URL
Release Date
08/31/2017
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3415
Port
TCP/3690
False Positive
Unknown
Vendors

Apache

CVSS Score

7.5

Found a potential security threat?