Vulnerabilities > CVE-2004-1438 - Unspecified vulnerability in Subversion
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
The mod_authz_svn Apache module for Subversion 1.0.4-r1 and earlier allows remote authenticated users, with write access to the repository, to read unauthorized parts of the repository via the svn copy command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Nessus
NASL family Misc. NASL id SUBVERSION_1_0_6.NASL description You are running a version of Subversion which is older than 1.0.6. A flaw exists in older version, in the apache module mod_authz_svn. An attacker can access to any file in a given subversion repository, no matter what restrictions have been set by the administrator. last seen 2020-06-01 modified 2020-06-02 plugin id 13848 published 2004-07-27 reporter This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13848 title Subversion < 1.0.6 mod_authz_svn Restricted File Access Bypass code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(13848); script_version("1.16"); script_cve_id("CVE-2004-1438"); script_bugtraq_id(10800); script_name(english:"Subversion < 1.0.6 mod_authz_svn Restricted File Access Bypass"); script_set_attribute(attribute:"synopsis", value: "The remote host has an application that may allow access to restricted files." ); script_set_attribute(attribute:"description", value: "You are running a version of Subversion which is older than 1.0.6. A flaw exists in older version, in the apache module mod_authz_svn. An attacker can access to any file in a given subversion repository, no matter what restrictions have been set by the administrator." ); script_set_attribute(attribute:"solution", value: "Upgrade to subversion 1.0.6 or newer." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/27"); script_set_attribute(attribute:"vuln_publication_date", value: "2004/07/26"); script_cvs_date("Date: 2018/07/30 15:31:32"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_end_attributes(); script_summary(english:"Check for Subversion version"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc."); script_family(english:"Misc."); script_dependencie("subversion_detection.nasl"); script_require_ports("Services/subversion"); exit(0); } # start check # mostly horked from MetaSploit Framework subversion overflow check port = get_kb_item("Services/subversion"); if ( ! port ) port = 3690; if (! get_tcp_port_state(port)) exit(0); dat = string("( 2 ( edit-pipeline ) 24:svn://host/svn/nessusr0x ) "); soc = open_sock_tcp(port); if (!soc) exit(0); r = recv_line(socket:soc, length:1024); if (! r) exit(0); send(socket:soc, data:dat); r = recv_line(socket:soc, length:256); if (! r) exit(0); #display(r); if (egrep(string:r, pattern:".*subversion-1\.0\.[0-5][^0-9].*")) { security_warning(port); } close(soc); exit(0);
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200407-20.NASL description The remote host is affected by the vulnerability described in GLSA-200407-20 (Subversion: Vulnerability in mod_authz_svn) Users with write access to part of a Subversion repository may bypass read restrictions on any part of that repository. This can be done using an last seen 2020-06-01 modified 2020-06-02 plugin id 14553 published 2004-08-30 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14553 title GLSA-200407-20 : Subversion: Vulnerability in mod_authz_svn code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200407-20. # # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(14553); script_version("1.15"); script_cvs_date("Date: 2019/08/02 13:32:41"); script_cve_id("CVE-2004-1438"); script_xref(name:"GLSA", value:"200407-20"); script_name(english:"GLSA-200407-20 : Subversion: Vulnerability in mod_authz_svn"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200407-20 (Subversion: Vulnerability in mod_authz_svn) Users with write access to part of a Subversion repository may bypass read restrictions on any part of that repository. This can be done using an 'svn copy' command to copy the portion of a repository the user wishes to read into an area where they have write access. Since copies are versioned, any such copy attempts will be readily apparent. Impact : This is a low-risk vulnerability. It affects only users of Subversion who are running servers inside Apache and using mod_authz_svn. Additionally, this vulnerability may be exploited only by users with write access to some portion of a repository. Workaround : Keep sensitive content separated into different Subversion repositories, or disable the Apache Subversion server and use svnserve instead." ); # http://svn.collab.net/repos/svn/tags/1.0.6/CHANGES script_set_attribute( attribute:"see_also", value:"http://svn.apache.org/repos/asf/subversion/branches/1.0.x/CHANGES" ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200407-20" ); script_set_attribute( attribute:"solution", value: "All Subversion users should upgrade to the latest available version: # emerge sync # emerge -pv '>=dev-util/subversion-1.0.6' # emerve '>=dev-util/subversion-1.0.6'" ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:subversion"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2004/07/26"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/08/30"); script_set_attribute(attribute:"vuln_publication_date", value:"2004/07/26"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"dev-util/subversion", unaffected:make_list("ge 1.0.6"), vulnerable:make_list("le 1.0.4-r1"))) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:qpkg_report_get()); else security_note(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Subversion"); }