FKIE_CVE-2015-3184
Vulnerability from fkie_nvd - Published: 2015-08-12 14:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC0E785D-FDCD-46DD-9BE9-049D6C1D6E1E",
"versionEndIncluding": "7.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*",
"matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*",
"matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*",
"matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*",
"matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A3256F8C-2CA8-43B5-96E5-794113FF531B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*",
"matchCriteriaId": "593F15F7-E610-458B-B094-BF6AC53B719A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.7.20:*:*:*:*:*:*:*",
"matchCriteriaId": "7F5C25F7-0A02-4974-8144-839955C373C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "89835508-F72F-4D8A-8E4A-5CFAA5F90C24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:subversion:1.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2A83933C-D270-4B9A-8D18-AC7302A5B86F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCD3C8C-9BF8-4F30-981A-593EEAEB9EDD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "046487A3-752B-4D0F-8984-96486B828EAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "89D2E052-51CD-4B57-A8B8-FAE51988D654",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EAA27058-BACF-4F94-8E3C-7D38EC302EC1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEAB0DF-04A9-4F99-8666-0BADC5D642B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E7D924D1-8A36-4C43-9E56-52814F9A6350",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "39CDFECC-E26D-47E0-976F-6629040B3764",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E3ECBCB1-0675-41F5-857B-438F36925F63",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6CBFBF-74F6-42AF-BC79-AA53EA75F00B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "69CB1C41-0360-44D0-B73A-273B0DDE46D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8717A96B-9DB5-48D6-A2CF-A5E2B26AF3F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name."
},
{
"lang": "es",
"value": "Vulnerabilidad en mod_authz_svn en Apache Subversion 1.7.x en versiones anteriores a 1.7.21 y 1.8.x en versiones anteriores a 1.8.14, al utilizar Apache httpd 2.4.x, no restringe correctamente el acceso an\u00f3nimo, lo que permite a usuarios an\u00f3nimos remotos leer archivos ocultos a trav\u00e9s del nombre de la ruta."
}
],
"id": "CVE-2015-3184",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-08-12T14:59:10.997",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://subversion.apache.org/security/CVE-2015-3184-advisory.txt"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2015/dsa-3331"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/76274"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id/1033215"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-2721-1"
},
{
"source": "secalert@redhat.com",
"url": "https://security.gentoo.org/glsa/201610-05"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT206172"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://subversion.apache.org/security/CVE-2015-3184-advisory.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2015/dsa-3331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/76274"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1033215"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2721-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201610-05"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT206172"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…