cve-2024-45720
Vulnerability from cvelistv5
Published
2024-10-09 12:38
Modified
2024-10-09 13:27
Severity ?
EPSS score ?
Summary
Apache Subversion: Command line argument injection on Windows platforms
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache Subversion |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-10-09T13:07:31.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/10/08/3" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "subversion", "vendor": "apache", "versions": [ { "lessThanOrEqual": "1.14.3", "status": "affected", "version": "1.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45720", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T13:20:38.607682Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T13:27:02.868Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "1.14.3", "status": "affected", "version": "1.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Orange Tsai (@orange_8361) from DEVCORE Research Team" }, { "lang": "en", "type": "finder", "value": "splitline (@_splitline_) from DEVCORE Research Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On Windows platforms, a \"best fit\" character encoding conversion of command line arguments to Subversion\u0027s executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.\u003cbr\u003e\u003cbr\u003eAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.\u003cbr\u003e\u003cbr\u003e\u003cdiv\u003eSubversion is not affected on UNIX-like platforms.\u003c/div\u003e\u003cbr\u003e" } ], "value": "On Windows platforms, a \"best fit\" character encoding conversion of command line arguments to Subversion\u0027s executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.\n\nAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.\n\nSubversion is not affected on UNIX-like platforms." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T12:38:28.971Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://subversion.apache.org/security/CVE-2024-45720-advisory.txt" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Subversion: Command line argument injection on Windows platforms", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-45720", "datePublished": "2024-10-09T12:38:28.971Z", "dateReserved": "2024-09-05T11:42:42.423Z", "dateUpdated": "2024-10-09T13:27:02.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-45720\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-10-09T13:15:11.337\",\"lastModified\":\"2024-10-10T12:51:56.987\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On Windows platforms, a \\\"best fit\\\" character encoding conversion of command line arguments to Subversion\u0027s executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.\\n\\nAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.\\n\\nSubversion is not affected on UNIX-like platforms.\"},{\"lang\":\"es\",\"value\":\"En las plataformas Windows, una conversi\u00f3n de codificaci\u00f3n de caracteres de \\\"ajuste \u00f3ptimo\\\" de argumentos de l\u00ednea de comandos a ejecutables de Subversion (por ejemplo, svn.exe, etc.) puede provocar una interpretaci\u00f3n inesperada de los argumentos de l\u00ednea de comandos, incluida la inyecci\u00f3n de argumentos y la ejecuci\u00f3n de otros programas, si se procesa una cadena de argumentos de l\u00ednea de comandos especialmente manipulada. Todas las versiones de Subversion hasta Subversion 1.14.3 incluida se ven afectadas solo en plataformas Windows. Se recomienda a los usuarios actualizar a la versi\u00f3n Subversion 1.14.4, que soluciona este problema. Subversion no se ve afectado en plataformas tipo UNIX.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"references\":[{\"url\":\"https://subversion.apache.org/security/CVE-2024-45720-advisory.txt\",\"source\":\"security@apache.org\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.