We are glad to announce that VisualSVN products have been updated to Apache HTTP Server 2.4.55 and OpenSSL 1.1.1t. Besides this, relevant VisualSVN products are now updated to the Expat XML parser 2.5.0.
This update fixes a number of security vulnerabilities, some of which may affect both the VisualSVN plug-in and VisualSVN Server. Therefore, updating to the new builds is recommended for all users.
Versions of VisualSVN Server prior to this update are affected by the moderate-severity CVE-2006-20001 vulnerability. It allows an authenticated attacker to perform a denial-of-service attack using a specially crafted request to the server. The underlying issue has been fixed in Apache HTTP Server 2.4.55.
As for the vulnerabilities fixed in OpenSSL 1.1.1t, the VisualSVN plug-in and default installations of VisualSVN Server are not affected by the high-severity CVE-2023-0286 vulnerability. However, versions of the VisualSVN plug-in and VisualSVN Server prior to this update can potentially be affected by the moderate-severity CVE-2022-4450 vulnerability.
Get the latest VisualSVN Server 5.1.3 version from the official download page. For the list of changes, see the VisualSVN Server 5.1.3 changelog.
Alternatively, choose an appropriate patch build if you do not want to perform a significant upgrade right now:
Other version families of VisualSVN Server are not supported, and maintenance updates are not available for them. It is strongly recommended to upgrade to VisualSVN Server 5.1.3 if you are using any version family older than 4.3.x. Please read the KB204: Upgrading to VisualSVN Server 5.1 article before upgrading.
Select an appropriate VisualSVN plug-in version with respect to your Visual Studio version:
Get the latest patch version of VisualSVN, appropriate for your Visual Studio release, from the official download page.