Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-12087

Опубликовано: 14 янв. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.5

Описание

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the --inc-recursive option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the --inc-recursive option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

РелизСтатусПримечание
devel

released

3.3.0+ds1-4
esm-infra-legacy/trusty

released

3.1.0-2ubuntu0.4+esm1
esm-infra/bionic

released

3.1.2-2.1ubuntu1.6+esm1
esm-infra/focal

not-affected

3.1.3-8ubuntu0.8
esm-infra/xenial

released

3.1.1-3ubuntu1.3+esm3
focal

released

3.1.3-8ubuntu0.8
jammy

released

3.2.7-0ubuntu0.22.04.3
noble

released

3.2.7-1ubuntu1.1
oracular

released

3.3.0-1ubuntu0.1
trusty/esm

ignored

end of ESM support, was needs-triage

Показывать по

EPSS

Процентиль: 31%
0.00114
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
5 месяцев назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
nvd
5 месяцев назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 6.5
debian
5 месяцев назад

A path traversal vulnerability exists in rsync. It stems from behavior ...

CVSS3: 6.5
github
5 месяцев назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

EPSS

Процентиль: 31%
0.00114
Низкий

6.5 Medium

CVSS3