An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).
[
{
"source": "https://git.samba.org/rsync.git@0e10163a9d984a8858f7d83b5c7b46889536aa96",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"322418424648570989550611125486404332983",
"2256083738362129417533540177355662595",
"29260464724962235148672620000941125284",
"233784350980936246018183436821512218824",
"246181918994674120560928381981150588850",
"181738393919906651933976864059518484652"
]
},
"target": {
"file": "exclude.c"
},
"id": "CVE-2022-29154-702f3360"
},
{
"source": "https://git.samba.org/rsync.git@0e10163a9d984a8858f7d83b5c7b46889536aa96",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "173887927958491418062456766931855792437",
"length": 3583.0
},
"target": {
"file": "exclude.c",
"function": "add_implied_include"
},
"id": "CVE-2022-29154-d8f7c92f"
}
]