Public Date:
1479686: CVE-2017-9800 subversion: Command injection through clients via malicious svn+ssh URLs
A shell command injection flaw related to the handling of "svn+ssh" URLs has been discovered in Subversion. An attacker could use this flaw to execute shell commands with the privileges of the user running the Subversion client, for example when performing a "checkout" or "update" action on a malicious repository, or a legitimate repository containing a malicious commit.

Find out more about CVE-2017-9800 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 6.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (subversion) RHSA-2017:2480 2017-08-15

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 subversion Will not fix
Red Hat Enterprise Linux 5 subversion Will not fix


Red Hat would like to thank the Subversion Team for reporting this issue.


There are various methods available to mitigate this issue. For further information, please refer to the Subversion advisory available at:

External References

Last Modified