Directory traversal vulnerability in Subversion before 1.4.5, as used by TortoiseSVN before 1.4.5 and possibly other products, when run on Windows-based systems, allows remote authenticated users to overwrite and create arbitrary files via a ..\ (dot dot backslash) sequence in the filename, as stored in the file repository.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/3004 | vdb entry |
http://subversion.tigris.org/servlets/ReadMsg?list=users&msgNo=69413 | mailing list |
http://tortoisesvn.net/node/291 | patch |
http://secunia.com/advisories/26632 | third party advisory patch vendor advisory |
http://www.securityfocus.com/bid/25468 | vdb entry |
http://crisp.cs.du.edu/?q=node/36 | |
http://osvdb.org/40119 | vdb entry |
http://subversion.tigris.org/servlets/NewsItemView?newsItemID=1941 | patch |
http://securitytracker.com/id?1018617 | vdb entry |
http://secunia.com/advisories/26625 | third party advisory patch vendor advisory |
http://www.vupen.com/english/advisories/2007/3003 | vdb entry |
http://osvdb.org/40118 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36312 | vdb entry |