CVE-2024-12087

Source
https://cve.org/CVERecord?id=CVE-2024-12087
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-12087.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-12087
Aliases
Downstream
Related
Published
2025-01-14T17:57:33.927Z
Modified
2026-05-15T04:08:34.669512357Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Rsync: path traversal vulnerability in rsync
Details

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the --inc-recursive option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the --inc-recursive option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

Database specific
{
    "cna_assigner": "redhat",
    "cwe_ids": [
        "CWE-22"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/12xxx/CVE-2024-12087.json"
}
References

Affected packages