Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-12086

Опубликовано: 14 янв. 2025
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.

Отчет

This vulnerability marked as moderate rather than important because it requires the attacker to control the rsync server, which limits the scope of exploitation to scenarios where the client interacts with untrusted or compromised servers. Additionally, the attack is non-trivial, as it relies on the attacker sending specially crafted checksum values and deducing file contents byte-by-byte based on the client’s responses. This makes the exploit more complex and time-consuming compared to direct file access vulnerabilities. Furthermore, the impact is limited to file data enumeration, and it does not allow arbitrary code execution or privilege escalation on the client. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-390: Detection of Error Condition Without Action vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform runs containerized workloads managed by liveness and readiness probes, ensuring applications recover from failures and do not operate in an unhealthy or insecure state. Firewalls are configured to fail securely, blocking unauthorized or malicious traffic during system failures or misconfigurations. Event logs are centrally collected and analyzed to detect recurring errors, crashes, and anomalous behavior. Error conditions are handled securely and audibly, ensuring failures are logged and addressed rather than ignored.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10rsyncAffected
Red Hat Enterprise Linux 6rsyncOut of support scope
Red Hat Enterprise Linux 7rsyncOut of support scope
Red Hat Enterprise Linux 8rsyncAffected
Red Hat Enterprise Linux 9rsyncAffected
Red Hat OpenShift Container Platform 4rhcosFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-390
https://bugzilla.redhat.com/show_bug.cgi?id=2330577rsync: rsync server leaks arbitrary client files

EPSS

Процентиль: 39%
0.00172
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
7 месяцев назад

A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.

CVSS3: 6.1
nvd
7 месяцев назад

A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.

CVSS3: 6.8
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 6.1
debian
7 месяцев назад

A flaw was found in rsync. It could allow a server to enumerate the co ...

CVSS3: 6.1
github
7 месяцев назад

A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.

EPSS

Процентиль: 39%
0.00172
Низкий

6.1 Medium

CVSS3