Vulnerability Name: | CVE-2013-7393 (CCN-95064) | ||||||||||||
Assigned: | 2014-07-28 | ||||||||||||
Published: | 2014-07-28 | ||||||||||||
Updated: | 2016-10-18 | ||||||||||||
Summary: | The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. Note: this issue was SPLIT from CVE-2013-4262 based on different affected versions (ADT3). | ||||||||||||
CVSS v3 Severity: | 5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 2.4 Low (CVSS v2 Vector: AV:L/AC:H/Au:S/C:N/I:P/A:P) 2.1 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:S/C:N/I:P/A:P/E:H/RL:OF/RC:C)
2.9 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P/E:H/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-59 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2013-7393 Source: CONFIRM Type: UNKNOWN http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Source: CCN Type: BID-68966 Apache Subversion 'irkerbridge.py' Local Privilege Escalation Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 1000194 (CVE-2013-4262, CVE-2013-7393) CVE-2013-4262 CVE-2013-7393 subversion: svnwcsub.py and irkerbridge.py are vulnerable to symlink attack Source: XF Type: UNKNOWN subversion-cve20137393-priv-esc(95064) Source: CCN Type: Apache Web site The admin-side optional utility daemons svnwcsub.py and irkerbridge.py are vulnerable to a local privilege escalation vulnerability via symlink attack Source: CONFIRM Type: Vendor Advisory https://subversion.apache.org/security/CVE-2013-4262-advisory.txt Source: CCN Type: WhiteSource Vulnerability Database CVE-2013-7393 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |