{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T09:12:02.833","vulnerabilities":[{"cve":{"id":"CVE-2021-28544","sourceIdentifier":"security@apache.org","published":"2022-04-12T18:15:08.250","lastModified":"2024-11-21T05:59:49.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal 'copyfrom' paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the 'copyfrom' path of the original. This also reveals the fact that the node was copied. Only the 'copyfrom' path is revealed; not its contents. Both httpd and svnserve servers are vulnerable."},{"lang":"es","value":"Apache Subversion SVN authz protected copyfrom paths regresión Los servidores de Subversion revelan rutas \"copyfrom\" que deberían estar ocultas de acuerdo con las reglas configuradas de autorización basada en rutas (authz). Cuando un nodo ha sido copiado desde una ubicación protegida, los usuarios con acceso a la copia pueden visualizar la ruta \"copyfrom\" del original. Esto también revela el hecho de que el nodo fue copiado. Sólo es revelada la ruta \"copyfrom\"; no su contenido. Los servidores httpd y svnserve son vulnerables"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:M\/Au:S\/C:P\/I:N\/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*","versionStartIncluding":"1.10.0","versionEndIncluding":"1.14.1","matchCriteriaId":"B0F5ACC5-2DD1-4E01-AF14-13B20CE4394B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","matchCriteriaId":"FA6FEEC2-9F11-4643-8827-749718254FED"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","matchCriteriaId":"80E516C0-98A4-4ADE-B69F-66A772E2BAAA"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","matchCriteriaId":"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.5","matchCriteriaId":"BFABC0C7-944C-4B46-A985-8B4F8BF93F54"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","matchCriteriaId":"80E516C0-98A4-4ADE-B69F-66A772E2BAAA"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","matchCriteriaId":"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"}]}]}],"references":[{"url":"http:\/\/seclists.org\/fulldisclosure\/2022\/Jul\/18","source":"security@apache.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce%40lists.fedoraproject.org\/message\/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R\/","source":"security@apache.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce%40lists.fedoraproject.org\/message\/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT\/","source":"security@apache.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/subversion.apache.org\/security\/CVE-2021-28544-advisory.txt","source":"security@apache.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https:\/\/support.apple.com\/kb\/HT213345","source":"security@apache.org","tags":["Third Party Advisory"]},{"url":"https:\/\/www.debian.org\/security\/2022\/dsa-5119","source":"security@apache.org","tags":["Third Party Advisory"]},{"url":"http:\/\/seclists.org\/fulldisclosure\/2022\/Jul\/18","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce%40lists.fedoraproject.org\/message\/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce%40lists.fedoraproject.org\/message\/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/subversion.apache.org\/security\/CVE-2021-28544-advisory.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https:\/\/support.apple.com\/kb\/HT213345","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/www.debian.org\/security\/2022\/dsa-5119","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}