CVE-2012-3356

The remote SVN views functionality (lib/vclib/svn/svn_ra.py) in ViewVC before 1.1.15 does not properly perform authorization, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
References
Link Resource
http://osvdb.org/83225
http://viewvc.tigris.org/issues/show_bug.cgi?id=353
http://viewvc.tigris.org/source/browse/%2Acheckout%2A/viewvc/tags/1.1.15/CHANGES
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2755
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2756
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2757
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2759
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2760
http://www.debian.org/security/2012/dsa-2563
http://www.mandriva.com/security/advisories?name=MDVSA-2013:134
http://www.openwall.com/lists/oss-security/2012/06/25/8
http://www.securityfocus.com/bid/54197
https://exchange.xforce.ibmcloud.com/vulnerabilities/76614
https://lwn.net/Articles/505096/
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175
http://osvdb.org/83225
http://viewvc.tigris.org/issues/show_bug.cgi?id=353
http://viewvc.tigris.org/source/browse/%2Acheckout%2A/viewvc/tags/1.1.15/CHANGES
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2755
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2756
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2757
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2759
http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2760
http://www.debian.org/security/2012/dsa-2563
http://www.mandriva.com/security/advisories?name=MDVSA-2013:134
http://www.openwall.com/lists/oss-security/2012/06/25/8
http://www.securityfocus.com/bid/54197
https://exchange.xforce.ibmcloud.com/vulnerabilities/76614
https://lwn.net/Articles/505096/
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:viewvc:viewvc:*:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:0.8:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:0.9:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:viewvc:viewvc:1.1.13:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-07-22 16:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-3356

Mitre link : CVE-2012-3356

CVE.ORG link : CVE-2012-3356


JSON object : View

Products Affected

viewvc

  • viewvc
CWE
CWE-287

Improper Authentication