cve/2024/CVE-2024-46901.md
2025-09-29 21:09:30 +02:00

20 lines
1.2 KiB
Markdown

### [CVE-2024-46901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46901)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Subversion&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen)
### Description
Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.All versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.Repositories served via other access methods are not affected.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/devhaozi/CVE-2024-46901
- https://github.com/nomi-sec/PoC-in-GitHub