CVE-2022-24070

7.5 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in Subversion's mod_dav_svn module that can lead to memory corruption. When processing path-based authorization rules, the server may access freed memory, potentially causing crashes or arbitrary code execution. Only Subversion servers using mod_dav_svn are affected.

💻 Affected Systems

Products:
  • Apache Subversion mod_dav_svn
Versions: 1.10.0 through 1.14.1 inclusive
Operating Systems: All operating systems running affected Subversion versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects servers using mod_dav_svn module. Standalone Subversion clients or servers without mod_dav_svn are not vulnerable.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, or lateral movement within the network.

🟠

Likely Case

Server crashes (denial of service) or memory corruption leading to unpredictable behavior.

🟢

If Mitigated

Limited to denial of service if exploit attempts fail or are blocked by security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires triggering the path-based authorization lookup process. No public exploit code was found in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Subversion 1.14.2 or later

Vendor Advisory: https://lists.apache.org/thread/4xl5d6k8sx9v9o1n0r8y2qjy7t1k3w6p

Restart Required: Yes

Instructions:

1. Upgrade Subversion to version 1.14.2 or later. 2. Restart Apache HTTP server or Subversion service. 3. Verify the patch is applied by checking version.

🔧 Temporary Workarounds

Disable mod_dav_svn

all

Temporarily disable the vulnerable module if not required

# Comment out LoadModule dav_svn_module in Apache config
# LoadModule dav_svn_module modules/mod_dav_svn.so

Disable path-based authorization

all

Remove or disable path-based authorization rules if possible

# Remove or comment out AuthzSVNAccessFile directives in Apache config

🧯 If You Can't Patch

  • Implement network segmentation to isolate Subversion servers from critical systems
  • Deploy web application firewall (WAF) rules to detect and block exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check if mod_dav_svn is loaded and Subversion version is between 1.10.0 and 1.14.1

Check Version:

svn --version | grep '^svn, version'

Verify Fix Applied:

Verify Subversion version is 1.14.2 or later and mod_dav_svn is still functional

📡 Detection & Monitoring

Log Indicators:

  • Apache error logs showing segmentation faults or memory corruption errors
  • Unusual Subversion access patterns or failed authorization attempts

Network Indicators:

  • Unusual HTTP requests to mod_dav_svn endpoints
  • Multiple connection attempts triggering authorization lookups

SIEM Query:

source="apache_error.log" AND ("segmentation fault" OR "memory corruption" OR "mod_dav_svn")

🔗 References

📤 Share & Export