Two flaws were reported in optional admin-side utilities that are provided with Subversion 1.8.x: svnwcsub.py and irkerbridge.py take a --pidfile option which creates a file containing the process id they are running as. Both of them do not take steps to ensure that the file they have been directed at is not a symlink. If the pid file is in a directory writeable by unprivileged users, the destination could be replaced by a symlink allowing for privilege escalation. Both are optional extra tools that are not installed by default and do not create a pid file by default. These tools are not provided in earlier versions of Subversion. Acknowledgements: Red Hat would like to thank Ben Reser of the Apache Subversion project for reporting this issue. Upstream acknowledges Daniel Shahaf of Apache Infrastructure as the original issue reporter. Statement: Not vulnerable. This issue did not affect the versions of subversion as shipped with Red Hat Enterprise Linux 5 or 6, as they did not ship the vulnerable versions of subversion.
This issue is embargoed until 29 August 2013 17:00 UTC.
Created attachment 789385 [details] upstream patch to fix CVE-2013-4262
External References: http://subversion.apache.org/security/CVE-2013-4262-advisory.txt
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-4262 to the following vulnerability: Name: CVE-2013-4262 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4262 Assigned: 20130612 Reference: https://subversion.apache.org/security/CVE-2013-4262-advisory.txt svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393. Common Vulnerabilities and Exposures assigned an identifier CVE-2013-7393 to the following vulnerability: Name: CVE-2013-7393 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7393 Assigned: 20140728 Reference: https://subversion.apache.org/security/CVE-2013-4262-advisory.txt The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions (ADT3).