{"api_version":"1","generated_at":"2026-04-23T04:10:06+00:00","cve":"CVE-2020-17525","urls":{"html":"https://cve.report/CVE-2020-17525","api":"https://cve.report/api/cve/CVE-2020-17525.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-17525","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-17525"},"summary":{"title":"CVE-2020-17525","description":"Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7","state":"PUBLIC","assigner":"security@apache.org","published_at":"2021-03-17 10:15:00","updated_at":"2022-01-01 18:03:00"},"problem_types":["CWE-476"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html","name":"[debian-lts-announce] 20210504 [SECURITY] [DLA 2646-1] subversion security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2646-1] subversion security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://subversion.apache.org/security/CVE-2020-17525-advisory.txt","name":"https://subversion.apache.org/security/CVE-2020-17525-advisory.txt","refsource":"MISC","tags":[],"title":"","mime":"text/x-diff","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-17525","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-17525","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Thomas Åkesson (simonsoft.se)","lang":""}],"nvd_cpes":[{"cve_year":"2020","cve_id":"17525","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"subversion","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"17525","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-17525","qid":"178601","title":"Debian Security Update for sub (DLA 2646-1)"},{"cve":"CVE-2020-17525","qid":"198804","title":"Ubuntu Security Notification for Subversion Vulnerabilities (USN-5445-1)"},{"cve":"CVE-2020-17525","qid":"296067","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 33.94.0 Missing (CPUAPR2021)"},{"cve":"CVE-2020-17525","qid":"377150","title":"Alibaba Cloud Linux Security Update for subversion:1.10 (ALINUX3-SA-2021:0018)"},{"cve":"CVE-2020-17525","qid":"500672","title":"Alpine Linux Security Update for subversion"},{"cve":"CVE-2020-17525","qid":"501501","title":"Alpine Linux Security Update for subversion"},{"cve":"CVE-2020-17525","qid":"504445","title":"Alpine Linux Security Update for subversion"},{"cve":"CVE-2020-17525","qid":"670334","title":"EulerOS Security Update for subversion (EulerOS-SA-2021-1890)"},{"cve":"CVE-2020-17525","qid":"670366","title":"EulerOS Security Update for subversion (EulerOS-SA-2021-1959)"},{"cve":"CVE-2020-17525","qid":"670387","title":"EulerOS Security Update for subversion (EulerOS-SA-2021-1938)"},{"cve":"CVE-2020-17525","qid":"690407","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for mod_dav_svn (06a5abd4-6bc2-11eb-b292-90e2baa3bafc)"},{"cve":"CVE-2020-17525","qid":"750362","title":"OpenSUSE Security Update for subversion (openSUSE-SU-2021:0280-1)"},{"cve":"CVE-2020-17525","qid":"900112","title":"CBL-Mariner Linux Security Update for subversion 1.14.0"},{"cve":"CVE-2020-17525","qid":"901018","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for subversion (6899-1)"},{"cve":"CVE-2020-17525","qid":"902999","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for subversion (3983)"},{"cve":"CVE-2020-17525","qid":"940067","title":"AlmaLinux Security Update for subversion:1.10 (ALSA-2021:0507)"},{"cve":"CVE-2020-17525","qid":"960822","title":"Rocky Linux Security Update for subversion:1.10 (RLSA-2021:0507)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","ID":"CVE-2020-17525","STATE":"PUBLIC","TITLE":"Remote unauthenticated denial-of-service in Subversion mod_authz_svn"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache Subversion","version":{"version_data":[{"version_affected":"<","version_name":"mod_authz_svn","version_value":"1.14.1"},{"version_affected":"!","version_name":"mod_authz_svn","version_value":"1.10.7"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"credit":[{"lang":"eng","value":"Thomas Åkesson (simonsoft.se)"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7"}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":[],"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-476 NULL Pointer Dereference"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://subversion.apache.org/security/CVE-2020-17525-advisory.txt","name":"https://subversion.apache.org/security/CVE-2020-17525-advisory.txt"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210504 [SECURITY] [DLA 2646-1] subversion security update","url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html"}]},"source":{"discovery":"UNKNOWN"},"work_around":[{"lang":"eng","value":"As a workaround, the use of in-repository authz rules files with the AuthzSVNReposRelativeAccessFile can be avoided by switching to an alternative configuration which fetches an authz rules file from the server's filesystem, rather than from an SVN repository."}]},"nvd":{"publishedDate":"2021-03-17 10:15:00","lastModifiedDate":"2022-01-01 18:03:00","problem_types":["CWE-476"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*","versionStartIncluding":"1.11.0","versionEndExcluding":"1.14.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9.0","versionEndExcluding":"1.10.7","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"17525","Ordinal":"178934","Title":"CVE-2020-17525","CVE":"CVE-2020-17525","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"17525","Ordinal":"1","NoteData":"Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7","Type":"Description","Title":null},{"CveYear":"2020","CveId":"17525","Ordinal":"2","NoteData":"2021-03-17","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"17525","Ordinal":"3","NoteData":"2021-05-04","Type":"Other","Title":"Modified"}]}}}