← Voltar para CVEs
CVE-2010-3315
N/ADescricao
authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado10/4/2010
Ultima modificacao4/29/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
apache:subversion
Fraquezas (CWE)
CWE-16
Referencias
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html(secalert@redhat.com)
http://secunia.com/advisories/41652(secalert@redhat.com)
http://secunia.com/advisories/43139(secalert@redhat.com)
http://secunia.com/advisories/43346(secalert@redhat.com)
http://security-tracker.debian.org/tracker/CVE-2010-3315(secalert@redhat.com)
http://subversion.apache.org/security/CVE-2010-3315-advisory.txt(secalert@redhat.com)
http://support.apple.com/kb/HT4581(secalert@redhat.com)
http://www.debian.org/security/2010/dsa-2118(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:199(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2011-0258.html(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1053-1(secalert@redhat.com)
http://www.vupen.com/english/advisories/2011/0264(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19007(secalert@redhat.com)
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/41652(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43139(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43346(af854a3a-2127-422b-91ae-364da2661108)
http://security-tracker.debian.org/tracker/CVE-2010-3315(af854a3a-2127-422b-91ae-364da2661108)
http://subversion.apache.org/security/CVE-2010-3315-advisory.txt(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT4581(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2010/dsa-2118(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:199(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2011-0258.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1053-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0264(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19007(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.