First published: Thu Dec 05 2024(Updated: )
A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rsync | <=3.2.3-4+deb11u1<=3.2.7-1 | 3.2.3-4+deb11u3 3.2.7-1+deb12u2 3.3.0+ds1-4 |
F5 BIG-IP and BIG-IQ Centralized Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-12087 is classified as a High severity vulnerability due to its potential for exploitation in path traversal scenarios.
To fix CVE-2024-12087, it is recommended to update rsync to versions 3.2.3-4+deb11u3, 3.2.7-1+deb12u2, or 3.3.0+ds1-4.
CVE-2024-12087 affects the rsync software, specifically versions up to 3.2.3-4+deb11u1 and 3.2.7-1.
The impact of CVE-2024-12087 is that it allows an attacker to access files outside of the intended directory via path traversal.
Yes, CVE-2024-12087 can be exploited remotely if an attacker has access to a vulnerable rsync server configured with the --inc-recursive option.