CVE-2024-12087

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
redhatCNA
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 44%
Debian logo
Debian Releases
Debian Product
Codename
rsync
bullseye
vulnerable
bullseye (security)
3.2.3-4+deb11u3
fixed
bookworm
3.2.7-1+deb12u2
fixed
bookworm (security)
3.2.7-1+deb12u2
fixed
sid
3.4.1+ds1-3
fixed
trixie
3.4.1+ds1-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
rsync
oracular
Fixed 3.3.0-1ubuntu0.1
released
noble
Fixed 3.2.7-1ubuntu1.1
released
jammy
Fixed 3.2.7-0ubuntu0.22.04.3
released
focal
Fixed 3.1.3-8ubuntu0.8
released
bionic
Fixed 3.1.2-2.1ubuntu1.6+esm1
released
xenial
Fixed 3.1.1-3ubuntu1.3+esm3
released
trusty
Fixed 3.1.0-2ubuntu0.4+esm1
released