Description
A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1052-1 | subversion security update |
Debian DLA |
DLA-1072-1 | mercurial security update |
Debian DLA |
DLA-1144-1 | git-annex security update |
Debian DLA |
DLA-1495-1 | git-annex security update |
Debian DSA |
DSA-3932-1 | subversion security update |
Ubuntu USN |
USN-3388-1 | Subversion vulnerabilities |
Ubuntu USN |
USN-3388-2 | Subversion vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T23:36:59.228Z
Reserved: 2017-06-21T00:00:00.000Z
Link: CVE-2017-9800
No data.
Status : Modified
Published: 2017-08-11T21:29:00.587
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-9800
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN