{"id":"CVE-2016-2167","details":"The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.","modified":"2026-03-20T11:06:01.962833Z","published":"2016-05-05T18:59:00.117Z","related":["MGASA-2016-0161","SUSE-SU-2016:1249-1","SUSE-SU-2016:1511-1","SUSE-SU-2017:2200-1","openSUSE-SU-2024:10538-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/89417"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html"},{"type":"WEB","url":"http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E"},{"type":"WEB","url":"http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035706"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html"},{"type":"ADVISORY","url":"http://subversion.apache.org/security/CVE-2016-2167-advisory.txt"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3561"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201610-05"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/subversion","events":[{"introduced":"0"},{"last_affected":"3dec6a0529685631fa7a4975a59424f815f121cb"},{"introduced":"0"},{"last_affected":"d5c449a05c043ec247cb68cb2bbb891779eb8566"},{"introduced":"0"},{"last_affected":"6a714a24a489050364efe1db2bc9ec894bbce349"},{"introduced":"0"},{"last_affected":"3f582fc98d82c0f76f7b9e695c53942f99560d11"},{"introduced":"0"},{"last_affected":"e03e7ac2e5341db1dc6646ecbd5893fc72f7d5cd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.8.15"},{"introduced":"0"},{"last_affected":"1.9.0"},{"introduced":"0"},{"last_affected":"1.9.1"},{"introduced":"0"},{"last_affected":"1.9.2"},{"introduced":"0"},{"last_affected":"1.9.3"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2167.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}]}