OS Command Injection Affecting subversion package, versions <1.14.4-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about OS Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE321-SUBVERSION-8486205
  • published6 Dec 2024
  • disclosed9 Oct 2024

Introduced: 9 Oct 2024

CVE-2024-45720  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade Alpine:3.21 subversion to version 1.14.4-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream subversion package and not the subversion package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.

All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.

Subversion is not affected on UNIX-like platforms.