#VU32288 Improper access control in Subversion - CVE-2016-2167 

 

#VU32288 Improper access control in Subversion - CVE-2016-2167

Published: May 5, 2016 / Updated: July 28, 2020


Vulnerability identifier: #VU32288
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-2167
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Subversion
Software vendor:
Apache Foundation

Description

The vulnerability allows a remote authenticated user to read and manipulate data.

The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.


Remediation

Install update from vendor's website.

External links