First published: Thu Dec 05 2024(Updated: )
A flaw was found in rsync. When using the `--safe-links` option, rsync fails to properly verify if a symbolic link destination contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rsync | <=3.2.3-4+deb11u1<=3.2.7-1 | 3.2.3-4+deb11u3 3.2.7-1+deb12u2 3.3.0+ds1-4 |
F5 BIG-IP and BIG-IQ Centralized Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-12088 is classified as a medium severity path traversal vulnerability in rsync.
To fix CVE-2024-12088, upgrade rsync to version 3.2.3-4+deb11u3, 3.2.7-1+deb12u2, or 3.3.0+ds1-4.
CVE-2024-12088 affects users of rsync versions up to and including 3.2.3-4+deb11u1 and 3.2.7-1.
CVE-2024-12088 is a path traversal vulnerability due to improper verification of symbolic link destinations.
Yes, CVE-2024-12088 may lead to arbitrary file writes outside the intended directory, potentially resulting in data loss.