Gentoo Logo

Subversion: Vulnerability in mod_authz_svn


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200407-20 / subversion
Release Date July 26, 2004
Latest Revision May 22, 2006: 02
Impact low
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
dev-util/subversion <= 1.0.4-r1 >= 1.0.6 All supported architectures

Related bugreports: #57747


Users with write access to parts of a Subversion repository may bypass read restrictions in mod_authz_svn and read any part of the repository they wish.

2.  Impact Information


Subversion is an advanced version control system, similar to CVS, which supports additional functionality such as the ability to move, copy and delete files and directories. A Subversion server may be run as an Apache module, a standalone server (svnserve), or on-demand over ssh (a la CVS' ":ext:" protocol). The mod_authz_svn Apache module works with Subversion in Apache to limit access to parts of Subversion repositories based on policy set by the administrator.


Users with write access to part of a Subversion repository may bypass read restrictions on any part of that repository. This can be done using an "svn copy" command to copy the portion of a repository the user wishes to read into an area where they have write access.

Since copies are versioned, any such copy attempts will be readily apparent.


This is a low-risk vulnerability. It affects only users of Subversion who are running servers inside Apache and using mod_authz_svn. Additionally, this vulnerability may be exploited only by users with write access to some portion of a repository.

3.  Resolution Information


Keep sensitive content separated into different Subversion repositories, or disable the Apache Subversion server and use svnserve instead.


All Subversion users should upgrade to the latest available version:

Code Listing 3.1: Resolution

# emerge sync

# emerge -pv ">=dev-util/subversion-1.0.6"
# emerve ">=dev-util/subversion-1.0.6"

4.  References


Page updated July 26, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.