On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.
All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.
Subversion is not affected on UNIX-like platforms.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows |
|
CPEs | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | |
Vendors & Products |
Microsoft
Microsoft windows |
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 09 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache subversion |
|
CPEs | cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache subversion |
|
Metrics |
ssvc
|
Wed, 09 Oct 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed. All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue. Subversion is not affected on UNIX-like platforms. | |
Title | Apache Subversion: Command line argument injection on Windows platforms | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-10-09T13:27:02.868Z
Reserved: 2024-09-05T11:42:42.423Z
Link: CVE-2024-45720

Updated: 2024-10-09T13:07:31.111Z

Status : Analyzed
Published: 2024-10-09T13:15:11.337
Modified: 2025-02-11T17:22:19.050
Link: CVE-2024-45720

No data.